INFO: task kworker/1:1:86 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:86 tgid:86 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:832e8c00 r4:832e8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858213c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594638c r4:85946000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594638c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e8c00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:df879e60 r6:832a0180 r5:832e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832cb300 INFO: task kworker/1:1:86 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2a41000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:2:720 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:720 tgid:720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0559d84 r8:00000002 r7:60000013 r6:e0559d8c r5:83881800 r4:83881800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83881800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83881800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593a38c r4:8593a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593a38c r4:83c34b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83881800 r8:83c34b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83c34b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c34b00 r8:80287e08 r7:df879e60 r6:83c34b80 r5:83881800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0559fb0 to 0xe0559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83c23f00 INFO: task kworker/1:2:720 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2a41000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:0:3099 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3099 tgid:3099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000013 r6:eb231d8c r5:832fe000 r4:832fe000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fe000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577eb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb31000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593b38c r4:8593b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593b38c r4:84822b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fe000 r8:84822bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822b80 r8:80287e08 r7:df9b9e60 r6:84822c00 r5:832fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5bc0 INFO: task kworker/1:0:3099 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2fcc000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:3:3116 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df995d84 r8:00000002 r7:60000113 r6:df995d8c r5:832fec00 r4:832fec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df995e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc07000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85948b8c r4:85948800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85948b8c r4:84822780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fec00 r8:848227ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822780 r8:80287e08 r7:df9b9e60 r6:84822f80 r5:832fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf995fb0 to 0xdf995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849fb4c0 INFO: task kworker/1:3:3116 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2fcc000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:9:3145 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83cd8000 r4:83cd8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cd8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cb80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550b78c r4:8550b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550b78c r4:84922480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cd8000 r8:849224ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922480 r8:80287e08 r7:df9d1e60 r6:84922500 r5:83cd8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701180 INFO: task kworker/1:9:3145 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e358b000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:10:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:83cdb000 r4:83cdb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cdb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594538c r4:85945000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594538c r4:84922580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cdb000 r8:849225ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922580 r8:80287e08 r7:df9c5e60 r6:84922600 r5:83cdb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84231080 INFO: task kworker/1:10:3146 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e358b000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:12:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b2b000 r4:83b2b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 INFO: task kworker/0:12:3148 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e3b31000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:13:3150 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83b2ec00 r4:83b2ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559bb8c r4:8559b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559bb8c r4:849f1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2ec00 r8:849f16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1680 r8:80287e08 r7:df9dde60 r6:849f1700 r5:83b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 INFO: task kworker/0:13:3150 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e40db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:14:3152 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83a69800 r4:83a69800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a69800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7adc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a69800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b238c r4:853b2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b238c r4:849f1780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a69800 r8:849f17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1780 r8:80287e08 r7:dfa79e60 r6:84922680 r5:83a69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846e8c80 INFO: task kworker/0:14:3152 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e40db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:15:3154 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83252400 r4:83252400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e091b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2b8c r4:853b2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2b8c r4:849f1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:849f182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1800 r8:80287e08 r7:dfa79e60 r6:849f1880 r5:83252400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c340 INFO: task kworker/0:15:3154 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e466e000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83236000 r4:83236000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ea880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3f8c r4:853b3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3f8c r4:849f1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:849f192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1900 r8:80287e08 r7:dfa79e60 r6:849f1980 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c1c0 INFO: task kworker/0:16:3156 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e466e000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3157 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:844b1800 r4:844b1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548678c r4:85486400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548678c r4:849f1a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b1800 r8:849f1a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1a00 r8:80287e08 r7:dfa79e60 r6:849f1a80 r5:844b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c4c0 INFO: task kworker/0:17:3157 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e4f05000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3160 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:844b3c00 r4:844b3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abf8c r4:854abc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854abf8c r4:84922700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b3c00 r8:8492272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922700 r8:80287e08 r7:dfa59e60 r6:849f1b00 r5:844b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813180 INFO: task kworker/1:11:3160 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e4f05000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3162 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:844b0000 r4:844b0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562cf8c r4:8562cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562cf8c r4:849f1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b0000 r8:849f1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1b80 r8:80287e08 r7:dfa79e60 r6:849f1c00 r5:844b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c940 INFO: task kworker/0:18:3162 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e50db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:844b0c00 r4:844b0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb425000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c178c r4:855c1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c178c r4:84922800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b0c00 r8:8492282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922800 r8:80287e08 r7:dfa59e60 r6:849f1c80 r5:844b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813680 INFO: task kworker/1:12:3164 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5865000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3165 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:844b3000 r4:844b3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593ab8c r4:8593a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593ab8c r4:84922880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b3000 r8:849228ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922880 r8:80287e08 r7:dfa59e60 r6:849f1d00 r5:844b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813680 INFO: task kworker/1:13:3165 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5865000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3168 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83a78000 r4:83a78000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a78000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a78000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eef8c r4:847eec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eef8c r4:849f1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a78000 r8:849f1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1d80 r8:80287e08 r7:dfacde60 r6:84922900 r5:83a78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473ce80 INFO: task kworker/0:19:3168 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5acd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3170 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:833aec00 r4:833aec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833aec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ae00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:833aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565138c r4:85651000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565138c r4:849f1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833aec00 r8:849f1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1e00 r8:80287e08 r7:dfab5e60 r6:84922980 r5:833aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473cd80 INFO: task kworker/0:20:3170 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5acd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3171 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83a68000 r4:83a68000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a68000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a68000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec637000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565278c r4:85652400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565278c r4:849f1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a68000 r8:849f1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1e80 r8:80287e08 r7:dfae5e60 r6:84922a00 r5:83a68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473cb40 INFO: task kworker/0:21:3171 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6425000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3173 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83886000 r4:83886000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83886000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eae00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83886000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85651f8c r4:85651c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85651f8c r4:830b8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83886000 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:80287e08 r7:dfae9e60 r6:84922a80 r5:83886000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a000 INFO: task kworker/0:22:3173 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6425000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3175 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:8394a400 r4:8394a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8394a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570ef00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8394a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb821000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565238c r4:85652000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565238c r4:830b8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8394a400 r8:830b872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:80287e08 r7:dfae9e60 r6:84922b00 r5:8394a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a040 INFO: task kworker/0:23:3175 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e66f5000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3177 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83880000 r4:83880000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83880000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fefc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83880000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaeb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83880000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfae9e60 r6:84922b80 r5:83880000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:24:3177 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e66f5000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83b05400 r4:83b05400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b05400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583fcc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b05400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565338c r4:85653000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565338c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b05400 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:dfb09e60 r6:84922c00 r5:83b05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a480 INFO: task kworker/0:25:3179 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6bfd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b02400 r4:83b02400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b02400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856288c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b02400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576678c r4:85766400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576678c r4:84550700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b02400 r8:8455072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84550700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84550700 r8:80287e08 r7:dfb09e60 r6:84922c80 r5:83b02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:26:3181 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6e70000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3184 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83b00c00 r4:83b00c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec653000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576478c r4:85764400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576478c r4:8480b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:8480b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b780 r8:80287e08 r7:dfb2de60 r6:84922d00 r5:83b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:27:3184 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e70d6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83b00000 r4:83b00000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b00000 r7:00000000 r6:83018000 r5:00001000 r4:7f0fd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec781000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493cf8c r4:8493cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493cf8c r4:8480b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00000 r8:8480b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b700 r8:80287e08 r7:dfb2de60 r6:84922d80 r5:83b00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:28:3187 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e730d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83b06000 r4:83b06000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b06000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847505c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b06000 r7:00000000 r6:83018000 r5:00001000 r4:7f0fb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec717000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493ef8c r4:8493ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493ef8c r4:8480b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06000 r8:8480b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b400 r8:80287e08 r7:dfb4de60 r6:84922e00 r5:83b06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a840 INFO: task kworker/0:29:3188 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7562000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000013 r6:dfb69d8c r5:8386d400 r4:8386d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fee40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8386d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493db8c r4:8493d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493db8c r4:8480b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386d400 r8:8480b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b200 r8:80287e08 r7:dfb59e60 r6:84922e80 r5:8386d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ac80 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7766000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:83869800 r4:83869800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83869800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83869800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493eb8c r4:8493e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493eb8c r4:8480bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83869800 r8:8480bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480bf80 r8:80287e08 r7:dfb69e60 r6:84922f00 r5:83869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:31:3192 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7bd6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83b01800 r4:83b01800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b01800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec629000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493cb8c r4:8493c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493cb8c r4:8480bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b01800 r8:8480bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480bf00 r8:80287e08 r7:dfb69e60 r6:84922f80 r5:83b01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ad40 INFO: task kworker/0:32:3194 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7bd6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb85d84 r8:00000002 r7:60000013 r6:dfb85d8c r5:83b03c00 r4:83b03c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b03c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a033c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c778c r4:859c7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c778c r4:8480be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b03c00 r8:8480beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480be80 r8:80287e08 r7:dfb69e60 r6:84922780 r5:83b03c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813dc0 INFO: task kworker/0:33:3195 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8181000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:83868000 r4:83868000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83868000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83868000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd41000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493d78c r4:8493d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493d78c r4:849f1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83868000 r8:849f1f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1f00 r8:80287e08 r7:dfb69e60 r6:83348880 r5:83868000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:34:3197 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8181000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84aa0c00 r4:84aa0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493ff8c r4:8493fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493ff8c r4:849f1f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa0c00 r8:849f1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1f80 r8:80287e08 r7:dfb69e60 r6:83348800 r5:84aa0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420af40 INFO: task kworker/0:35:3199 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8523000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3201 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:844b6c00 r4:844b6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb91000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493df8c r4:8493dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493df8c r4:8474b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b6c00 r8:8474b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b000 r8:80287e08 r7:dfb69e60 r6:8474b080 r5:844b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750100 INFO: task kworker/0:36:3201 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e89b7000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3204 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:844b6000 r4:844b6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859febc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493e38c r4:8493e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493e38c r4:8474b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b6000 r8:8474b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b100 r8:80287e08 r7:dfb69e60 r6:8474b180 r5:844b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750200 INFO: task kworker/0:37:3204 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e89b7000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3206 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:844b5400 r4:844b5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fea40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493f38c r4:8493f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493f38c r4:8474b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b5400 r8:8474b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b200 r8:80287e08 r7:dfba5e60 r6:8474b280 r5:844b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847500c0 INFO: task kworker/0:38:3206 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:844b2400 r4:844b2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb919000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493c78c r4:8493c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493c78c r4:8474b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b2400 r8:8474b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b300 r8:80287e08 r7:dfbb9e60 r6:8474b380 r5:844b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750300 INFO: task kworker/0:39:3208 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000013 r6:dfbcdd8c r5:844b4800 r4:844b4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493fb8c r4:8493f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493fb8c r4:8474b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b4800 r8:8474b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b400 r8:80287e08 r7:dfbb9e60 r6:8474b480 r5:844b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750700 INFO: task kworker/0:40:3210 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3212 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:832ea400 r4:832ea400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832ea400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a08ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:832ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859fa78c r4:859fa400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859fa78c r4:8474b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832ea400 r8:8474b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b500 r8:80287e08 r7:dfbcde60 r6:8474b580 r5:832ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750880 INFO: task kworker/0:41:3212 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9377000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3213 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:83238c00 r4:83238c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493e78c r4:8493e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493e78c r4:8474b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238c00 r8:8474b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b600 r8:80287e08 r7:dfbe1e60 r6:8474b680 r5:83238c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750980 INFO: task kworker/0:42:3213 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9377000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3217 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84911800 r4:84911800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84911800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84911800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1b8c r4:859b1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b1b8c r4:8474b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84911800 r8:8474b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b700 r8:80287e08 r7:dfbe1e60 r6:8474b780 r5:84911800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750e80 INFO: task kworker/0:43:3217 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3219 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84912400 r4:84912400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84912400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a31680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84912400 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b038c r4:859b0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b038c r4:8474b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84912400 r8:8474b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b800 r8:80287e08 r7:dfbe1e60 r6:8474b880 r5:84912400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f140 INFO: task kworker/0:44:3219 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3221 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84913000 r4:84913000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84913000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b50c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84913000 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84791b8c r4:84791800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84791b8c r4:8474b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84913000 r8:8474b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b900 r8:80287e08 r7:dfbe1e60 r6:8474b980 r5:84913000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f3c0 INFO: task kworker/0:45:3221 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3223 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84aa2400 r4:84aa2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f1240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f215000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479278c r4:84792400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479278c r4:8474ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa2400 r8:8474ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ba00 r8:80287e08 r7:dfc15e60 r6:84762000 r5:84aa2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f000 INFO: task kworker/0:46:3223 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9c73000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3226 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84aa0000 r4:84aa0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475f9c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa0000 r7:00000000 r6:83018000 r5:00001000 r4:7f213000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b3f8c r4:859b3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b3f8c r4:8474ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa0000 r8:8474baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ba80 r8:80287e08 r7:dfc1de60 r6:84762080 r5:84aa0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f700 INFO: task kworker/0:47:3226 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9c73000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3227 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84aa3000 r4:84aa3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f1dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b3b8c r4:859b3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b3b8c r4:8474bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa3000 r8:8474bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bb00 r8:80287e08 r7:dfc35e60 r6:84762100 r5:84aa3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f840 INFO: task kworker/0:48:3227 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9f1c000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3229 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:84913c00 r4:84913c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84913c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599e800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84913c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9838c r4:85b98000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b9838c r4:8474bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84913c00 r8:8474bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bb80 r8:80287e08 r7:dfc41e60 r6:8474bc00 r5:84913c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f900 INFO: task kworker/0:49:3229 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9f1c000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3233 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84aa4800 r4:84aa4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577ecc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593bb8c r4:8593b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593bb8c r4:84762180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa4800 r8:847621ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762180 r8:80287e08 r7:dfa59e60 r6:84762200 r5:84aa4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474dc00 INFO: task kworker/1:14:3233 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea20a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000013 r6:dfbedd8c r5:84aa5400 r4:84aa5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578a600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b97f8c r4:85b97c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b97f8c r4:8474bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa5400 r8:8474bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bc80 r8:80287e08 r7:dfc31e60 r6:84762280 r5:84aa5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475fb00 INFO: task kworker/0:50:3234 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea20a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3236 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:84aa6000 r4:84aa6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc4f8c r4:85bc4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc4f8c r4:8474bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa6000 r8:8474bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bd00 r8:80287e08 r7:dfbede60 r6:84762300 r5:84aa6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475ff40 INFO: task kworker/0:51:3236 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea99f000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3237 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84914800 r4:84914800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84914800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84914800 r7:00000000 r6:83018000 r5:00001000 r4:7f305000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc778c r4:85bc7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc778c r4:8474bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84914800 r8:8474bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bd80 r8:80287e08 r7:df9e9e60 r6:8474be00 r5:84914800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475fdc0 INFO: task kworker/0:52:3237 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea99f000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3240 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df971d84 r8:00000002 r7:60000013 r6:df971d8c r5:84aa6c00 r4:84aa6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb83000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594438c r4:85944000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594438c r4:84762380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa6c00 r8:847623ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762380 r8:80287e08 r7:dfa59e60 r6:84762400 r5:84aa6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474d300 INFO: task kworker/1:15:3240 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eac06000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3242 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84aa1800 r4:84aa1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa1800 r7:00000000 r6:83018000 r5:00001000 r4:7f47b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdbb8c r4:85bdb800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdbb8c r4:8474be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa1800 r8:8474beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474be80 r8:80287e08 r7:df9e9e60 r6:84762480 r5:84aa1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:53:3242 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eac06000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3244 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84aa3c00 r4:84aa3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a31b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd8f8c r4:85bd8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd8f8c r4:8480b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa3c00 r8:8480b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b600 r8:80287e08 r7:dfc4de60 r6:84762500 r5:84aa3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b080 INFO: task kworker/0:54:3244 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eae99000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3247 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84480c00 r4:84480c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84480c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84480c00 r7:00000000 r6:83018000 r5:00001000 r4:7f479000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed185000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdb78c r4:85bdb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdb78c r4:8474bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84480c00 r8:8474bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bf00 r8:80287e08 r7:dfc4de60 r6:84762580 r5:84480c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b1c0 INFO: task kworker/0:55:3247 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eae99000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3249 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84482400 r4:84482400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84482400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475b440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84482400 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd93000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdab8c r4:85bda800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdab8c r4:84761000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84482400 r8:8476102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761000 r8:80287e08 r7:dfc59e60 r6:84762600 r5:84482400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b280 INFO: task kworker/0:56:3249 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb35d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3250 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84483000 r4:84483000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84483000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85993200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84483000 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece33000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bda78c r4:85bda400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bda78c r4:84761100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84483000 r8:8476112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761100 r8:80287e08 r7:dfc61e60 r6:84762680 r5:84483000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b5c0 INFO: task kworker/0:57:3250 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb35d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3252 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:84481800 r4:84481800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84481800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85993000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84481800 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd9f8c r4:85bd9c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd9f8c r4:84761080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84481800 r8:847610ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761080 r8:80287e08 r7:dfc61e60 r6:84762700 r5:84481800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b580 INFO: task kworker/0:58:3252 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb5ef000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3255 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000013 r6:dfc79d8c r5:84483c00 r4:84483c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84483c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475b700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd878c r4:85bd8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd878c r4:84761180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84483c00 r8:847611ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761180 r8:80287e08 r7:dfc61e60 r6:84762780 r5:84483c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b700 INFO: task kworker/0:59:3255 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb9d6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3256 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84486000 r4:84486000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84486000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85944b8c r4:85944800 r7:ddde2d80 r6:83018200 r5:85944b8c r4:84762800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb28dd28 to 0xeb28dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3257 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:84484800 r4:84484800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84484800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c74b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84484800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bda38c r4:85bda000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bda38c r4:84761200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84484800 r8:8476122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfc81fb0 to 0xdfc81ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeb28dd28 to 0xeb28dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r5:00001000 r4:eafb1000 r4:850f5b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdb38c r4:85bdb000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdb38c r4:84761380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84486c00 r8:847613ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761380 r8:80287e08 r7:dfc81e60 r6:84762980 r5:84486c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b900 INFO: task kworker/0:61:3259 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec140000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8484c9c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edcdb000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85dbdf8c r4:84761400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577a7c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f55b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed509000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479cb8c r4:8479c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479cb8c r4:84761480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8c00 r8:847614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761480 r8:80287e08 r7:dfc89e60 r6:84762a80 r5:848d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475bf00 INFO: task kworker/0:63:3265 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec537000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3266 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:64 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a33340 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479eb8c r4:8479e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3268 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:848d8000 r4:848d8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4f100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f5bb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca6f8c r4:85ca6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca6f8c r4:84761580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8000 r8:847615ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761580 r8:80287e08 r7:dfc89e60 r6:84762b80 r5:848d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475ba00 INFO: task kworker/0:65:3268 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec86a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:8484c9c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848da400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bea38c r4:85bea000 r7:dddced80 r6:83018000 r5:85bea38c r4:84761600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848da400 r8:8476162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761600 r8:80287e08 r7:dfc89e60 r6:84762c00 r5:848da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953080 INFO: task kworker/0:66:3271 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec9c6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:67 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84916000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84916000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6b6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84916000 r7:00000000 r6:83018000 r5:00001000 r4:7f605000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed845000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbdb8c r4:85dbd800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbdb8c r4:84761680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84916000 r8:847616ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761680 r8:80287e08 r7:dfc89e60 r6:84761700 r5:84916000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953040 INFO: task kworker/0:67:3272 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: ec9c6000 eccab000 00000001 80239b98 7f437000 00000001 r7:00000000 r6:ffffffff r5:8281c9a0 r4:00000000 r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85946b8c r4:85946800 r10:61c88647 r9:848db000 r8:84762cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494de40 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3275 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:848dc800 r4:848dc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85945b8c r4:85945800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85945b8c r4:84762d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dc800 r8:84762dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762d80 r8:80287e08 r7:dfca9e60 r6:84762e00 r5:848dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8494dd40 INFO: task kworker/1:18:3275 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7f85a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848dd400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dbf38c r4:85dbf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbf38c r4:84761780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dd400 r8:847617ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761780 r8:80287e08 r7:dfc89e60 r6:84762e80 r5:848dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849532c0 INFO: task kworker/0:68:3278 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7f85a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3280 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:848de000 r4:848de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbd78c r4:85dbd400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbd78c r4:84761800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84761800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3282 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:848dec00 r4:848dec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f711000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcdd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbeb8c r4:85dbe800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbeb8c r4:84761880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dec00 r8:847618ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761880 r8:80287e08 r7:dfcbde60 r6:84762f80 r5:848dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 90000113 ffffffff r4:eb291dc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed887000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493f78c r4:8493f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493f78c r4:84761900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dbc00 r8:8476192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761900 r8:80287e08 r7:dfcbde60 r6:84959000 r5:848dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953500 INFO: task kworker/0:71:3284 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7fe04000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbe38c r4:85dbe000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84761980 r8:80287e08 r7:dfcdde60 r6:84959080 r5:8394bc00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 801ea000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3288 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84485400 r4:84485400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84485400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e726c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ecf43000 r5:8496038c r4:84960000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496038c r4:84761a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84485400 r8:84761a2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3290 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf9d84 r8:00000002 r7:60000013 r6:dfcf9d8c r5:849b8000 r4:849b8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496138c r4:84961000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496138c r4:84761a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8000 r8:84761aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761a80 r8:80287e08 r7:dfcf5e60 r6:84959180 r5:849b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953cc0 INFO: task kworker/0:74:3290 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80ab5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3293 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:849b8c00 r4:849b8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6de40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f88d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee16b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e6938c r4:85e69000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e6938c r4:84761b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8c00 r8:84761b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761b00 r8:80287e08 r7:dfcf9e60 r6:84959200 r5:849b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953e40 INFO: task kworker/0:75:3293 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80ab5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3295 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:849b9800 r4:849b9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e75bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f8c3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc178c r4:85dc1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc178c r4:84761b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b9800 r8:84761bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761b80 r8:80287e08 r7:dfc49e60 r6:84959280 r5:849b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953e40 INFO: task kworker/0:76:3295 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80e70000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3297 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:849ba400 r4:849ba400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ba400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473c540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f8dd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc238c r4:85dc2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc238c r4:84761c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ba400 r8:84761c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761c00 r8:80287e08 r7:dfd15e60 r6:84959300 r5:849ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953bc0 INFO: task kworker/0:77:3297 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8108a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3299 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:849bb000 r4:849bb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f8f9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed725000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc2f8c r4:85dc2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc2f8c r4:84761c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bb000 r8:84761cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761c80 r8:80287e08 r7:dfd1de60 r6:84959380 r5:849bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953500 INFO: task kworker/0:78:3299 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 811f2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3301 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:849bbc00 r4:849bbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb57000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479d78c r4:8479d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479d78c r4:84761d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bbc00 r8:84761d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761d00 r8:80287e08 r7:dfaf9e60 r6:84959400 r5:849bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954140 INFO: task kworker/0:79:3301 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3302 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:849bc800 r4:849bc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15180 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f8dd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc2b8c r4:85dc2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc2b8c r4:84761d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bc800 r8:84761dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761d80 r8:80287e08 r7:dfb05e60 r6:84959480 r5:849bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954140 INFO: task kworker/0:80:3302 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 81636000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:20:3307 blocked for more than 452 seconds. r4:849be000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594738c r4:85947000 r7:ddde2d80 r6:83018200 r5:8594738c r4:84959600 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3309 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3309 tgid:3309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:849bec00 r4:849bec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb55000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4e3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496438c r4:84964000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496438c r4:84761e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bec00 r8:84761e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761e00 r8:80287e08 r7:dfb05e60 r6:84959700 r5:849bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954580 INFO: task kworker/0:81:3309 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 81c5e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/0:82 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee479000 r5:8496778c r4:84967400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84761e80 1fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3313 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:849c0000 r4:849c0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849c0000 r7:00000000 r6:83018000 r5:00001000 r4:7fb4f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee429000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84964b8c r4:84964800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84964b8c r4:84761f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c0000 r8:84761f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761f00 r8:80287e08 r7:dfb61e60 r6:84959800 r5:849c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954880 INFO: task kworker/0:83:3313 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 81f78000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3315 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc9d84 r8:00000002 r7:60000013 r6:dfbc9d8c r5:849c3000 r4:849c3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84967f8c r4:84967c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849c3000 r8:84761fac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3316 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3316 tgid:3316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:849c3c00 r4:849c3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8496478c r4:84964400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496478c r4:84761280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c3c00 r8:847612ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:849c2400 r7:00000000 r6:83018000 r5:00001000 r4:7fb43000 r5:84965b8c r4:84965800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8480bc80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3322 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd25d84 r8:00000002 r7:60000113 r6:dfd25d8c r5:849c6000 r4:849c6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849c6000 r7:00000000 r6:83018000 r5:00001000 r4:7fa8b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee615000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85fee38c r4:85fee000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85fee38c r4:8494f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c6000 r8:8494f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f000 r8:80287e08 r7:dfc19e60 r6:84959a00 r5:849c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954cc0 INFO: task kworker/0:87:3322 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8261a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:849c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7faf9000 r5:8600b38c r4:8600b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8600b38c r4:8494f080 r10:61c88647 r9:849c6c00 r8:8494f0ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3324 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3324 tgid:3324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd35d84 r8:00000002 r7:60000113 r6:dfd35d8c r5:849c4800 r4:849c4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e80340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849c4800 r7:00000000 r6:83018000 r5:00001000 r4:7fad7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee731000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84966b8c r4:84966800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84966b8c r4:8494f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c4800 r8:8494f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f100 r8:80287e08 r7:dfd25e60 r6:84959b00 r5:849c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954540 INFO: task kworker/0:89:3324 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 82eb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84964f8c r4:84964c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 832bf000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3328 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:84850c00 r4:84850c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84850c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e801c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84850c00 r7:00000000 r6:83018000 r5:00001000 r4:7fad3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee725000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84966f8c r4:84966c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84966f8c r4:8494f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84850c00 r8:8494f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f200 Exception stack(0xdfd49fb0 to 0xdfd49ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 r5:00001000 r4:eafbb000 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/0:92 state:D stack:0 pid:3331 tgid:3331 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7fa67000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd7f8c r4:85dd7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd7f8c r4:8494f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84850000 r8:8494f2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f280 r8:80287e08 r7:dfd25e60 r6:84959c80 r5:84850000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953a80 INFO: task kworker/0:92:3331 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8351f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3334 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:84852400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8496578c r4:84965400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496578c r4:8494f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84852400 r8:8494f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f300 r8:80287e08 r7:dfd55e60 r6:84959d00 r5:84852400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a47300 INFO: task kworker/0:93:3334 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 83753000 eafa9000 00000001 80239b98 7f439000 00000001 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 r4:8484cc40 task:kworker/0:94 state:D stack:0 pid:3335 tgid:3335 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84853c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa65000 r5:85dd7b8c r4:85dd7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84853c00 r8:8494f3ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 83753000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:3337 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3337 tgid:3337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:84853000 r4:84853000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84853000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7fa63000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee323000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd738c r4:85dd7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd738c r4:8494f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84853000 r8:8494f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f400 r8:80287e08 r7:dfd65e60 r6:84959e00 r5:84853000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd6dfb0 to 0xdfd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred 1d20: 83bd9000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7fa57000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3a9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd6b8c r4:85dd6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd6b8c r4:8494f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84855400 r8:8494f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f480 r8:80287e08 r7:dfd6de60 r6:84959e80 r5:84855400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a47540 INFO: task kworker/0:96:3339 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 83bd9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/0:97:3340 blocked for more than 452 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85dd778c r4:85dd7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84854800 r8:8494f52c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:98:3342 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:98 state:D stack:0 pid:3342 tgid:3342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd81d84 r8:00000002 r7:60000113 r6:dfd81d8c r5:84851800 r4:84851800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84851800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364b80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84851800 r7:00000000 r6:83018000 r5:00001000 r4:7fa5f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd6f8c r4:85dd6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd6f8c r4:8494f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84851800 r8:8494f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f580 r8:80287e08 r7:dfd75e60 r6:84959f80 r5:84851800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd81fb0 to 0xdfd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a477c0 INFO: task kworker/0:98:3342 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 83e68000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:3344 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:3344 tgid:3344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84916c00 r4:84916c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84916c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e806c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84916c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa69000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8600378c r4:86003400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8600378c r4:8494f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84916c00 r8:8494f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f600 r8:80287e08 r7:dfd75e60 r6:8494f680 r5:84916c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a47800 INFO: task kworker/0:99:3344 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8450a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:8484cc40 task:kworker/0:100 state:D stack:0 pid:3346 tgid:3346 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496738c r4:84967000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496738c r4:8494f700 r10:61c88647 r9:84915400 r8:8494f72c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3349 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3349 tgid:3349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfda5d84 r8:00000002 r7:60000113 r6:dfda5d8c r5:84910000 r4:84910000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84910000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84910000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85947b8c r4:85947800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85947b8c r4:84a57000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84910000 r8:84a5702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a57000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a57000 r8:80287e08 r7:dfb15e60 r6:8494f800 r5:84910000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a42c80 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:3351 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:3351 tgid:3351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdade08 r9:83018005 r8:84910c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb21000 r5:86018b8c r4:86018800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86018b8c r4:8494f880 r10:61c88647 r9:84910c00 r8:8494f8ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:102:3353 blocked for more than 452 seconds. r4:84468c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84967b8c r4:84967800 r7:dddced80 r6:83018000 r5:84967b8c r4:8494f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a47fc0 INFO: task kworker/0:102:3353 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 84bb0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:103:3355 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:103 state:D stack:0 pid:3355 tgid:3355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdc5d84 r8:00000002 r7:60000013 r6:dfdc5d8c r5:8446a400 r5:8446a400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85de638c r4:85de6000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de638c r4:8494fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8446a400 r8:8494faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/0:344:4708 blocked for more than 452 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17340 r5:8529ab8c r4:8529a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ab8c r4:85146480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84900c00 r8:851464ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85146480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85146480 r8:80287e08 r7:eb1dde60 r6:85146500 r5:84900c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85350ac0 INFO: task kworker/0:344:4708 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 85249000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a171c0 r5:8529a78c r4:8529a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a78c r4:85146c80 r4:85146c80 1fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:481 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c478c r4:853c4400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c478c r4:850f5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533c800 r8:850f5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5c00 r8:80287e08 r7:eb291e60 r6:850f5c80 r5:8533c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cd40 INFO: task kworker/1:481:4783 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 85517000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4785 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:8533d400 r4:8533d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8525978c r4:85259400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850f5d00 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 r5:00001000 r4:eafbb000 r4:850f5d80 r4:00000001 r4:8484cc40 task:kworker/1:483 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:84906000 r4:84906000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84906000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84824000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84906000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c4f8c r4:853c4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c4f8c r4:84a09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84906000 r8:84a0902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09000 r8:80287e08 r7:eb299e60 r6:85146f00 r5:84906000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824080 INFO: task kworker/1:483:4790 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 85cfa000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:85296f8c r4:85296c00 r7:ddde2d80 r6:83018200 r5:85296f8c r4:84a09080 Exception stack(0xeb29dfb0 to 0xeb29dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 85cfa000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4792 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:853d0000 r4:853d0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85236f8c r4:85236c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85236f8c r4:84a09100 r10:61c88647 r9:853d0000 r8:84a0912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84824040 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:348:4794 blocked for more than 452 seconds. r4:853d0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a176c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0805000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529af8c r4:8529ac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529af8c r4:849e0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d0c00 r8:849e00ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0080 r8:80287e08 r7:eb1e5e60 r6:849e0100 r5:853d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a17540 INFO: task kworker/0:348:4794 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 85fff000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/0:349 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8529b38c r4:8529b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529b38c r4:849e0180 r10:00000000 r9:849e0180 r8:80287e08 r7:eb2a5e60 r6:849e0200 r5:853d2400 r4:84a17440 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17b80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b78c r4:8529b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529b78c r4:849e0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d1800 r8:849e02ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0280 r8:80287e08 r7:eb2a9e60 r6:849e0300 r5:853d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a17940 INFO: task kworker/0:350:4799 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 863d1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4800 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb281d84 r8:00000002 r7:60000013 r6:eb281d8c r5:8533e000 r4:8533e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8442bb8c r4:8442b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8442bb8c r4:84a09180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533e000 r8:84a091ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09180 r8:80287e08 r7:eb29de60 r6:84a09200 r5:8533e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84824400 INFO: task kworker/1:486:4800 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 867b0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/0:351:4801 blocked for more than 453 seconds. r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:8533ec00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bf8c r4:8529bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529bf8c r4:849e0380 r10:61c88647 r9:8533ec00 r8:849e03ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4805 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85341800 r4:85341800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85341800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17f80 r5:00001000 r4:eabf9000 r5:8539838c r4:85398000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539838c r4:849e0400 r10:61c88647 r9:85341800 r8:849e042c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:353:4807 blocked for more than 453 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:00001000 r4:eac21000 r5:85398b8c r4:85398800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849e0600 r8:80287e08 r7:eb2c5e60 r6:84a09380 r5:85343000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4808 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:85340000 r4:85340000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85340000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84740000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85340000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaced000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539938c r4:85399000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539938c r4:849e0480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85340000 r8:849e04ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0480 r8:80287e08 r7:eb2cde60 r6:84a09400 r5:85340000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a17e40 INFO: task kworker/0:354:4808 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 87056000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85342400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539978c r4:85399400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539978c r4:849e0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85342400 r8:849e052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0500 r8:80287e08 r7:eb2d1e60 r6:84a09480 r5:85342400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84740340 INFO: task kworker/0:355:4811 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 874f1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Not tainted 6.15.0-rc5-syzkaller #0 Call trace: r5:85340c00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85399f8c r4:85399c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85399f8c r4:849e0580 r10:61c88647 r9:85340c00 r8:849e05ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4814 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:85345400 r4:85345400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85345400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847404c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85345400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85399b8c r4:85399800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85399b8c r4:849e0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85345400 r8:849e06ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0680 r8:80287e08 r7:eb2dde60 r6:84a09580 r5:85345400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847400c0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eae73000 r5:85398f8c r4:85398c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4819 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:853d5400 r4:853d5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847407c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae03000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539a78c r4:8539a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a78c r4:849e0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d5400 r8:849e092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0900 r8:80287e08 r7:eb2c9e60 r6:849e0980 r5:853d5400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539ab8c r4:8539a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539ab8c r4:849e0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6c00 r8:849e082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0800 r8:80287e08 r7:eb2c9e60 r6:849e0880 r5:853d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847406c0 INFO: task kworker/0:360:4820 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 887bc000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 r5:853d3000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84740a40 r5:8539af8c r4:8539ac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849e0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0a00 r8:80287e08 r7:eb2c9e60 r6:849e0a80 r5:853d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84740580 INFO: task kworker/0:361:4822 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 88a62000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 INFO: task kworker/0:362:4824 blocked for more than 453 seconds. r4:8532d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539a38c r4:8539a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539a38c r4:849e0b00 r10:61c88647 r9:8532d400 r8:849e0b2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb301fb0 to 0xeb301ff8) INFO: task kworker/0:362:4824 is blocked on a mutex likely owned by task kworker/1:480:4781. 1d20: 88a62000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:363 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000013 r6:eb305d8c r5:853d6000 r4:853d6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bf8c r4:8539bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bf8c r4:849e0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6000 r8:849e0c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0c00 r8:80287e08 r7:eb301e60 r6:849e0c80 r5:853d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84740c80 INFO: task kworker/0:363:4825 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8962c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:4827 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:84780c00 r4:84780c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84780c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84780c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b38c r4:8539b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b38c r4:849e0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84780c00 r8:849e0d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0d00 r8:80287e08 r7:eb305e60 r6:849e0d80 r5:84780c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84740880 INFO: task kworker/0:364:4827 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8962c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:84780000 r4:8291a680 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84740880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84780000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539b78c r4:8539b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539b78c r4:849e0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84780000 r8:849e0e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0e00 r8:80287e08 r7:eb305e60 r6:849e0e80 r5:84780000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:84783000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:847ec38c r4:847ec000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ec38c r4:849e0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84783000 r8:849e0f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e0f00 r8:80287e08 r7:eb305e60 r6:849e0f80 r5:84783000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f41c0 INFO: task kworker/0:366:4832 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8962c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4a80 r5:853a038c r4:853a0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84785400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84785400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539bb8c r4:8539b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539bb8c r4:84a5a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84785400 r8:84a5a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5a080 r8:80287e08 r7:eb319e60 r6:84a5a100 r5:84785400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4100 INFO: task kworker/0:368:4836 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8a12b000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84782400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r5:00001000 r4:eb0ad000 r5:8529878c r4:85298400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a5a180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f48c0 INFO: task kworker/0:369:4839 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8a379000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4841 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4841 tgid:4841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb339d84 r8:00000002 r7:60000013 r6:eb339d8c r5:84786000 r4:84786000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84786000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534c9c0 r5:8529778c r4:85297400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529778c r4:84a09680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84786000 r8:84a096ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:370:4842 blocked for more than 453 seconds. r5:84786c00 r4:8291a680 r4:00000000 r4:00000000 r5:853a0f8c r4:853a0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84786c00 r8:84a5a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5a280 r8:80287e08 r7:eb319e60 r6:84a5a380 r5:84786c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4b80 INFO: task kworker/0:370:4842 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8a5fd000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:4843 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:84784800 r4:84784800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84784800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:853a0b8c r4:853a0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a0b8c r4:84a5a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84784800 r8:84a5a42c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4847 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000013 r6:eb33dd8c r5:84781800 r4:84781800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84781800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17f40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84781800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1b8c r4:853a1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1b8c r4:84a5a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84781800 r8:84a5a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5a500 r8:80287e08 r7:eb2f9e60 r6:84a5a580 r5:84781800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f4b40 INFO: task kworker/0:372:4847 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8ada1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d3c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4f40 r5:853a178c r4:853a1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a178c r4:84a5a600 r10:00000000 r9:84a5a600 r8:80287e08 r7:eb33de60 r6:84a5a680 r5:853d3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:373:4848 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8ada1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b200 r5:853a238c r4:853a2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a238c r4:84a5a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:84a5a72c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:4852 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb351d84 r8:00000002 r7:60000013 r6:eb351d8c r5:853e0c00 r4:853e0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb199000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a1f8c r4:853a1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a1f8c r4:84a5a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0c00 r8:84a5a82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a5a800 r8:80287e08 r7:eb34de60 r6:84a5a880 r5:853e0c00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r5:853a278c r4:853a2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853e1800 r8:84a5a92c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8b2d9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4856 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:853e2400 r4:853e2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2f8c r4:853a2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2f8c r4:84a5aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e2400 r8:84a5aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a5aa00 r8:80287e08 r7:eb359e60 r6:84a5aa80 r5:853e2400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a2b8c r4:853a2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a2b8c r4:84a5ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:84a5ab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5ab00 r8:80287e08 r7:eb345e60 r6:84a5ab80 r5:853e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7b7c0 INFO: task kworker/0:378:4858 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8b9f7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:379:4860 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4860 tgid:4860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:853e3c00 r4:853e3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7b840 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a338c r4:853a3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a338c r4:84a5ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:84a5ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5ac00 r8:80287e08 r7:eb345e60 r6:84a5ac80 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7b740 INFO: task kworker/0:379:4860 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8be5d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e4800 r5:853e4800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r9:83018005 r8:853e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:853a378c r4:853a3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a378c r4:84a5ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e4800 r8:84a5ad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a5ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a5ad00 r8:80287e08 r7:eb369e60 r6:84a5ad80 r5:853e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7b7c0 INFO: task kworker/0:380:4863 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8bf93000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4864 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000113 r6:eb37dd8c r5:853e5400 r4:853e5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539878c r4:85398400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539878c r4:84a5ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:84a5ae2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb37dfb0 to 0xeb37dff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7bc80 r5:853a078c r4:853a0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853e6000 r8:84a5af2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7b040 INFO: task kworker/0:382:4865 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8c4b2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4868 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4868 tgid:4868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:853e6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853a3f8c r4:853a3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a3f8c r4:85354000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85354000 r8:80287e08 r7:eb37de60 r6:85354080 r5:853e6c00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4870 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:853e8000 r4:853e8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f4e40 r5:853b038c r4:853b0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b038c r4:85354100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8000 r8:8535412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:853e8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8529bb8c r4:8529b800 r10:61c88647 r9:853e8c00 r8:8535422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354200 r8:80287e08 r7:eb3a9e60 r6:85354280 r5:853e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a17e40 INFO: task kworker/0:385:4871 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8c7d3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:386 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853b078c r4:853b0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b078c r4:85354300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85354300 r8:80287e08 r7:eb3a9e60 r6:85354380 r5:853e9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:387:4877 blocked for more than 453 seconds. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0775000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b0b8c r4:853b0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b0b8c r4:85354400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:8535442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354400 r8:80287e08 r7:eb3b5e60 r6:85354480 r5:853ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7bf40 INFO: task kworker/0:387:4877 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8cc1e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:4879 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:853eb000 r4:853eb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b000 r5:8540d38c r4:8540d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540d38c r4:84a09700 r4:84a09700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:488:4879 is blocked on a mutex likely owned by task kworker/1:480:4781. 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:853ebc00 r4:853ebc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ebc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534cd80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e092b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540c38c r4:8540c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540c38c r4:84a09780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ebc00 r8:84a097ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09780 r8:80287e08 r7:eb3c1e60 r6:85354580 r5:853ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534ce80 INFO: task kworker/1:489:4881 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8cf6d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:853ec800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361300 r5:853b0f8c r4:853b0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4884 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000013 r6:eb3c5d8c r5:853ed400 r4:853ed400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ed400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534cbc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540cb8c r4:8540c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540cb8c r4:84a09800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ed400 r8:84a0982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09800 r8:80287e08 r7:eb3c1e60 r6:85354700 r5:853ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534ce80 INFO: task kworker/1:490:4884 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8d69e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 r4:00000000 r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853ee000 r4:8291a680 r4:00000000 r9:83018005 r8:853ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:853b138c r4:853b1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b138c r4:85354780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ee000 r8:853547ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354780 r8:80287e08 r7:eb3b5e60 r6:85354800 r5:853ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85361380 INFO: task kworker/0:389:4887 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8d69e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:4889 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:853eec00 r4:853eec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535eb00 r5:853b1f8c r4:853b1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1f8c r4:85354880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85354880 r8:80287e08 r7:eb3b5e60 r6:85354900 r5:853eec00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8540c78c r4:8540c400 r7:ddde2d80 r6:83018200 r5:8540c78c r4:84a09880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:84a098ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09880 r8:80287e08 r7:eb3c1e60 r6:85354980 r5:853f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b140 INFO: task kworker/1:491:4891 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8dd7a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4892 blocked for more than 453 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8540d78c r4:8540d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540d78c r4:84a09900 r10:61c88647 r9:853f0c00 r8:84a0992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:4895 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb401d84 r8:00000002 r7:60000013 r6:eb401d8c r5:853f1800 r4:853f1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540df8c r4:8540dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540df8c r4:84a09980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f1800 r8:84a099ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09980 r8:80287e08 r7:eb3fde60 r6:85354a80 r5:853f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b340 INFO: task kworker/1:493:4895 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8e080000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:853f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:8540e38c r4:8540e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a09a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09a80 r8:80287e08 r7:eb401e60 r6:85354b00 r5:853f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b540 INFO: task kworker/1:494:4897 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8e080000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:853f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:8540e78c r4:8540e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540e78c r4:84a09a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84a09a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:496:4901 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb40dd84 r8:00000002 r7:60000013 r6:eb40dd8c r5:853f3c00 r4:853f3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b178c r4:853b1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b178c r4:84a09b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3c00 r8:84a09b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09b00 r8:80287e08 r7:eb409e60 r6:85354c00 r5:853f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b880 INFO: task kworker/1:496:4901 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8e936000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eb291dc0 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:853f4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r9:83018205 r8:853f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:8540f38c r4:8540f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853f4800 r8:84a09bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4905 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:853f5400 r4:853f5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540cf8c r4:8540cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540cf8c r4:84a09c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f5400 r8:84a09c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09c00 r8:80287e08 r7:eb411e60 r6:85354d00 r5:853f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b4c0 INFO: task kworker/1:498:4905 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8eca3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853f8000 r4:8291a680 r4:00000000 r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:8540ef8c r4:8540ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853f8000 r8:84a09cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536bec0 INFO: task kworker/1:499:4908 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8eca3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4910 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb429d84 r8:00000002 r7:60000113 r6:eb429d8c r5:853f9800 r4:853f9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8540fb8c r4:8540f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540fb8c r4:84a09d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84a09d00 r8:80287e08 r7:eb411e60 r6:85354e00 r5:853f9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4911 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:853fa400 r4:853fa400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fa400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536bd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c7b8c r4:853c7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c7b8c r4:84a09f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fa400 r8:84a09f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09f00 r8:80287e08 r7:eb429e60 r6:85354e80 r5:853fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536bf00 INFO: task kworker/1:501:4911 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8f35a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4913 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:853fbc00 r4:853fbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b4c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540eb8c r4:8540e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540eb8c r4:84a09d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fbc00 r8:84a09dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09d80 r8:80287e08 r7:eb42de60 r6:85354f00 r5:853fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536b600 INFO: task kworker/1:502:4913 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8f676000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:4914 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:853f8c00 r4:853f8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534cf40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540ff8c r4:8540fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540ff8c r4:84a09e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f8c00 r8:84a09eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a09e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a09e80 r8:80287e08 r7:eb42de60 r6:85354f80 r5:853f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534c740 INFO: task kworker/1:503:4914 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4916 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:853fb000 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85410b8c r4:85410800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410b8c r4:84a09e00 r10:61c88647 r9:853fb000 r8:84a09e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 8fa12000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:4918 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb445d84 r8:00000002 r7:60000013 r6:eb445d8c r5:853fd400 r4:853fd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:8540f78c r4:8540f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540f78c r4:84a09f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fd400 r8:84a09fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d20: 8fccd000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8541078c r4:85410400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:507:4923 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb451d84 r8:00000002 r7:60000013 r6:eb451d8c r5:853fe000 r4:853fe000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fe000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541178c r4:85411400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541178c r4:85363000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fe000 r8:8536302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363000 r8:80287e08 r7:eb441e60 r6:85359180 r5:853fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535d180 INFO: task kworker/1:507:4923 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 903ba000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:8541138c r4:85411000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeb291d28 to 0xeb291d70) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4927 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:853f6c00 r4:853f6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:853f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541038c r4:85410000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541038c r4:85363180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6c00 r8:853631ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363180 r8:80287e08 r7:eb451e60 r6:85359280 r5:853f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535d480 INFO: task kworker/1:509:4927 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 906c6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:510 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r5:00001000 r4:eb475000 r5:85411f8c r4:85411c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411f8c r4:85363200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85363200 r8:80287e08 r7:eb451e60 r6:85359300 r5:853f6000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4931 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:84970000 r4:84970000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7ac40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84970000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b278c r4:853b2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b278c r4:85359380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970000 r8:853593ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85359380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359380 r8:80287e08 r7:eb3b5e60 r6:85359400 r5:84970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e9c0 INFO: task kworker/0:391:4931 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:4933 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb479d84 r8:00000002 r7:60000113 r6:eb479d8c r5:84970c00 r4:84970c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85411b8c r4:85411800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411b8c r4:85363280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970c00 r8:853632ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363280 r8:80287e08 r7:eb469e60 r6:85359480 r5:84970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535d740 INFO: task kworker/1:511:4933 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 90f6d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r5:80000113 r4:80239bb0 r4:82ac21e4 r4:eb291dc0 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:4935 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:84972400 r4:84972400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84972400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85412b8c r4:85412800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412b8c r4:85363300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84972400 r8:8536332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363300 r8:80287e08 r7:eb469e60 r6:85359500 r5:84972400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535d900 INFO: task kworker/1:512:4935 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 90f6d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:513:4937 blocked for more than 454 seconds. r4:84973c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8541278c r4:85412400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541278c r4:85363380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973c00 r8:853633ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363380 r8:80287e08 r7:eb485e60 r6:85359580 r5:84973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535dd40 INFO: task kworker/1:513:4937 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9146a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8541338c r4:85413000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541338c r4:85363400 r10:00000000 r9:85363400 r8:80287e08 r7:eb485e60 r6:85359600 r5:84971800 INFO: task kworker/1:514:4939 is blocked on a mutex likely owned by task kworker/1:480:4781. 1d20: 9146a000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:515:4941 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:84974800 r4:84974800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84974800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ddc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85412f8c r4:85412c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412f8c r4:85363480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84974800 r8:853634ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363480 r8:80287e08 r7:eb4a1e60 r6:85359680 r5:84974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535dec0 INFO: task kworker/1:515:4941 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 914d4000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:516 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a000 r5:85413b8c r4:85413800 r7:ddde2d80 r6:83018200 r5:85413b8c r4:85363500 r4:85363500 r10:00000000 r9:85363500 r8:80287e08 r7:eb4a1e60 r6:85359700 r5:84975400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:516:4943 is blocked on a mutex likely owned by task kworker/1:480:4781. r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 917d6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4944 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000013 r6:eb4bdd8c r5:84976000 r4:84976000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534c140 r5:8541238c r4:85412000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541238c r4:85363580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85363580 r8:80287e08 r7:eb4b9e60 r6:85359780 r5:84976000 INFO: task kworker/1:517:4944 is blocked on a mutex likely owned by task kworker/1:480:4781. r4:00000000 1d20: 917d6000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:4947 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d1d84 r8:00000002 r7:60000013 r6:eb4d1d8c r5:84973000 r4:84973000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85413f8c r4:85413c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85413f8c r4:85363600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973000 r8:8536362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363600 r8:80287e08 r7:eb4b9e60 r6:85359800 r5:84973000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535a140 INFO: task kworker/1:518:4947 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 91f14000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a2c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa75000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85410f8c r4:85410c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410f8c r4:85363680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976c00 r8:853636ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb00dfb0 to 0xeb00dff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:00000000 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:4951 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:854b0c00 r4:854b0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85414b8c r4:85414800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85414b8c r4:85363700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b0c00 r8:8536372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363700 r8:80287e08 r7:eb4d1e60 r6:85359900 r5:854b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535a280 INFO: task kworker/1:520:4951 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 92669000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:521 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541438c r4:85414000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541438c r4:85363780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b1800 r8:853637ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363780 r8:80287e08 r7:eb4d5e60 r6:85359980 r5:854b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535a480 INFO: task kworker/1:521:4952 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 92669000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4954 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:854b0000 r4:00000000 r4:00000000 r5:8541478c r4:85414400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541478c r4:85363880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b0000 r8:853638ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) Workqueue: events bpf_prog_free_deferred 1d20: 92669000 eafa9000 00000001 80239b98 7f439000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:854b2400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8541538c r4:85415000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b2400 r8:8536382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363800 r8:80287e08 r7:eb4e1e60 r6:85359a80 r5:854b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535a480 INFO: task kworker/1:523:4956 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 92669000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4958 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f1d84 r8:00000002 r7:60000013 r6:eb4f1d8c r5:854b3000 r4:854b3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541578c r4:85415400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541578c r4:85363900 r10:61c88647 r9:854b3000 r8:8536392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4960 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:85344800 r4:85344800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85344800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535aac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85344800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85415b8c r4:85415800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85415b8c r4:85363980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85344800 r8:853639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363980 r8:80287e08 r7:eb4e1e60 r6:85363a00 r5:85344800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85346000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r9:83018205 r8:85346000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85416f8c r4:85416c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85416f8c r4:85363a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85346000 r8:85363aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363a80 r8:80287e08 r7:eb4e1e60 r6:85363b00 r5:85346000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535ac40 INFO: task kworker/1:526:4963 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 93149000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4965 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4965 tgid:4965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:85346c00 r4:85346c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85346c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535acc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85415f8c r4:85415c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85415f8c r4:85363b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85346c00 r8:85363bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363b80 r8:80287e08 r7:eb4f5e60 r6:85363c00 r5:85346c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535adc0 INFO: task kworker/1:527:4965 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 93149000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85343c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:8541638c r4:85416000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541638c r4:85363c80 r4:85363c80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 934e6000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:529:4970 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred r5:852f6c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361940 r5:8541678c r4:85416400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541678c r4:85363d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f6c00 r8:85363dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363d80 r8:80287e08 r7:eb4f5e60 r6:85363e00 r5:852f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e040 INFO: task kworker/1:529:4970 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 934e6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:4971 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:85438000 r4:85438000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475a080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85438000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae89000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541778c r4:85417400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541778c r4:85363e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438000 r8:85363eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363e80 r8:80287e08 r7:eb4f5e60 r6:85363f00 r5:85438000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535ad80 INFO: task kworker/1:530:4971 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 93a87000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4972 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:85438c00 r4:85438c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535df80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85414f8c r4:85414c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85414f8c r4:85363f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:85363fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85363f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85363f80 r8:80287e08 r7:eb509e60 r6:850f5f00 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535e540 INFO: task kworker/1:531:4972 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb05b000 r5:85417f8c r4:85417c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85417f8c r4:84a13000 r10:61c88647 r9:85439800 r8:84a1302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a13000 r8:80287e08 r7:eb509e60 r6:84a13080 r5:85439800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:532:4975 is blocked on a mutex likely owned by task kworker/1:480:4781. r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4977 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:8543a400 r4:8543a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475a280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8543a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85417b8c r4:85417800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85417b8c r4:84a13100 r10:61c88647 r9:8543a400 r8:84a1312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4979 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb519d84 r8:00000002 r7:60000013 r6:eb519d8c r5:8543b000 r4:8543b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475a240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85416b8c r4:85416800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85416b8c r4:84a13200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543b000 r8:84a1322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13200 r8:80287e08 r7:eb50de60 r6:84a13280 r5:8543b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475a4c0 INFO: task kworker/1:534:4979 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94280000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:8543bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8540db8c r4:8540d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540db8c r4:84a13300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543bc00 r8:84a1332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13300 r8:80287e08 r7:eb519e60 r6:84a13380 r5:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475a100 INFO: task kworker/1:535:4981 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94515000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4982 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:8543c800 r4:8543c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475a980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c38c r4:8541c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c38c r4:84a13400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:84a1342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13400 r8:80287e08 r7:eb51de60 r6:84a13480 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475a800 INFO: task kworker/1:536:4982 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94515000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4985 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:8543d400 r4:8543d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475aa00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cb8c r4:8541c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cb8c r4:84a13500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543d400 r8:84a1352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13500 r8:80287e08 r7:eb511e60 r6:84a13580 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475a940 INFO: task kworker/1:537:4985 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 949c2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4987 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:8543ec00 r4:8543ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475ac00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb129000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c78c r4:8541c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c78c r4:84a13600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:84a1362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13600 r8:80287e08 r7:eb521e60 r6:84a13680 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475aa40 INFO: task kworker/1:538:4987 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94d14000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4989 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:85440c00 r4:85440c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85440c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830cbb40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85440c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d78c r4:8541d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d78c r4:84a13700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440c00 r8:84a1372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13700 r8:80287e08 r7:eb529e60 r6:84a13780 r5:85440c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475aa80 INFO: task kworker/1:539:4989 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94d14000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4990 blocked for more than 454 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:85441800 r4:85441800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85441800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475af80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85441800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d38c r4:8541d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:84a13800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85441800 r8:84a1382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13800 r8:80287e08 r7:eb52de60 r6:84a13880 r5:85441800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475aa40 INFO: task kworker/1:540:4990 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94f9d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4993 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4993 tgid:4993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:854b5400 r4:854b5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b378c r4:853b3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b378c r4:85359b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b5400 r8:85359bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85359b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85359b80 r8:80287e08 r7:eb3b5e60 r6:85359c00 r5:854b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7aec0 INFO: task kworker/0:392:4993 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 94f9d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ee000 r5:8541df8c r4:8541dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:4998 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:854b6c00 r4:854b6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ee200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e38c r4:8541e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:84a13980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b6c00 r8:84a139ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13980 r8:80287e08 r7:dfd39e60 r6:85359d00 r5:854b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ee300 INFO: task kworker/1:542:4998 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9553f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85424f8c r4:85424c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85424f8c r4:84a13a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84988000 r8:84a13a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84a13a00 r8:80287e08 r7:eb539e60 r6:85359d80 r5:84988000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:5001 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:84988c00 r4:84988c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84988c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ee3c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8541db8c r4:8541d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541db8c r4:84a13a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84988c00 r8:84a13aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:8498a400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8541eb8c r4:8541e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541eb8c r4:84a13b00 r4:84a13b00 dfa0: 00000000 00000000 00000000 00000000 r4:849ee080 INFO: task kworker/1:545:5003 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 95d75000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:5005 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84989800 r4:00000000 r4:00000000 r5:8541ef8c r4:8541ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ef8c r4:84a13b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84989800 r8:84a13bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13b80 r8:80287e08 r7:eb541e60 r6:85359f00 r5:84989800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ee4c0 INFO: task kworker/1:546:5005 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9601a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:5007 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:8498b000 r4:8498b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8498b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ee540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8498b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e78c r4:8541e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e78c r4:84a13c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84a13c00 r8:80287e08 r7:eb541e60 r6:85359f80 r5:8498b000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8498d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8541f38c r4:8541f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a13c80 r8:80287e08 r7:eb541e60 r6:849e6000 r5:8498d400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:5011 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:8498e000 r4:8498e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8498e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:8541f78c r4:8541f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f78c r4:84a13d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8498e000 r8:84a13d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13d00 r8:80287e08 r7:eb541e60 r6:849e6080 r5:8498e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ee940 INFO: task kworker/1:549:5011 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9690f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3b9000 r5:8541ff8c r4:8541fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8498bc00 r8:84a13dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:5015 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:8498c800 r4:8498c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8498c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eed00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8498c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541378c r4:85413400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541378c r4:84a13e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8498c800 r8:84a13e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13e00 r8:80287e08 r7:eb541e60 r6:849e6180 r5:8498c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849eeac0 INFO: task kworker/1:551:5015 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:5018 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb599d84 r8:00000002 r7:60000013 r6:eb599d8c r5:8498ec00 r4:8498ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8498ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eee40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8498ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb585000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541738c r4:85417000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541738c r4:84a13e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8498ec00 r8:84a13eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a13e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a13e80 r8:80287e08 r7:eb541e60 r6:849e6200 r5:8498ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849eedc0 INFO: task kworker/1:552:5018 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 96dd4000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8542438c r4:85424000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542438c r4:830cc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b3c00 r8:830cc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:5021 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:854c0c00 r4:854c0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eb5a1000 r5:85424b8c r4:85424800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85424b8c r4:84a13f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84a13f00 r8:80287e08 r7:eb541e60 r6:849e6300 r5:854c0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:854c1800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542538c r4:85425000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542538c r4:832a0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c1800 r8:832a03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0380 r8:80287e08 r7:eb541e60 r6:849e6380 r5:854c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b7a480 INFO: task kworker/1:555:5024 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 974ac000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:5026 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:854c2400 r4:854c2400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:854c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0701000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85425f8c r4:85425c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85425f8c r4:832a0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c2400 r8:832a08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0880 r8:80287e08 r7:eb5bde60 r6:849e6400 r5:854c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a0140 INFO: task kworker/1:556:5026 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:854c3000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dff8b000 r5:85425b8c r4:85425800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 97b28000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:5030 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000013 r6:eb5a9d8c r5:85443c00 r4:85443c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85443c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a0800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85443c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542638c r4:85426000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542638c r4:832a0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85443c00 r8:832a032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0300 r10:00000000 r9:832a0300 r8:80287e08 r7:eb459e60 r6:832a0800 r5:85443c00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:559:5033 blocked for more than 455 seconds. r4:85444800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r5:8542578c r4:85425400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851e9000 r8:80287e08 r7:eb5a9e60 r6:851e9080 r5:85444800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a0000 INFO: task kworker/1:559:5033 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 98019000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:5035 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df99dd84 r8:00000002 r7:60000013 r6:df99dd8c r5:85443000 r4:85443000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85443000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85426b8c r4:85426800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85426b8c r4:851e9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85443000 r8:851e912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9100 r8:80287e08 r7:eb5a9e60 r6:851e9180 r5:85443000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a0000 INFO: task kworker/1:560:5035 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 98019000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:5037 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df885d84 r8:00000002 r7:60000113 r6:df885d8c r5:85445400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85445400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:85426f8c r4:85426c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85426f8c r4:851e9200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:851e9200 r8:80287e08 r7:df99de60 r6:851e9280 r5:85445400 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:562:5039 blocked for more than 455 seconds. r4:85446000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542778c r4:85427400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542778c r4:851e9300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:5041 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:85446c00 r4:85446c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a0c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542738c r4:85427000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542738c r4:851e9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446c00 r8:851e942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9400 r8:80287e08 r7:eb4ade60 r6:851e9480 r5:85446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a08c0 INFO: task kworker/1:563:5041 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:5043 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:85442400 r4:85442400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85442400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2f8c r4:853b2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b2f8c r4:851e9500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85442400 r8:851e952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9500 r8:80287e08 r7:eb4ade60 r6:851e9580 r5:85442400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a0d80 INFO: task kworker/1:564:5043 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 98a83000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:5044 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:83244800 r4:83244800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7aac0 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85427b8c r4:85427800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85427b8c r4:851e9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:566:5047 blocked for more than 455 seconds. r4:83a65400 r4:00000000 r4:00000000 r5:8542478c r4:85424400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542478c r4:851e9700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a65400 r8:851e972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9700 r8:80287e08 r7:eb5c5e60 r6:851e9780 r5:83a65400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4080 INFO: task kworker/1:566:5047 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 98eff000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85440000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85427f8c r4:85427c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85440000 r8:851e982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9800 r8:80287e08 r7:eb5d1e60 r6:851e9880 r5:85440000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4240 INFO: task kworker/1:567:5049 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 991a0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:568:5051 blocked for more than 455 seconds. r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:85448000 r4:85448000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cf8c r4:8541cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cf8c r4:851e9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85448000 r8:851e992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9900 r8:80287e08 r7:eb5d5e60 r6:851e9980 r5:85448000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4400 INFO: task kworker/1:568:5051 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8542c38c r4:8542c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542c38c r4:851e9a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85449800 r8:851e9a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9a00 r8:80287e08 r7:eb5d9e60 r6:851e9a80 r5:85449800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4780 INFO: task kworker/1:569:5053 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 994e9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:570:5055 blocked for more than 455 seconds. r4:8544b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r9:83018205 r8:8544b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8542cb8c r4:8542c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542cb8c r4:851e9b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:851e9b00 r8:80287e08 r7:eb5dde60 r6:851e9b80 r5:8544b000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:8542d38c r4:8542d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542d38c r4:851e9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544bc00 r8:851e9cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9c80 r8:80287e08 r7:eb5e1e60 r6:851e9d00 r5:8544bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4d00 INFO: task kworker/1:571:5057 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 99a6d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:5059 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e9d84 r8:00000002 r7:60000013 r6:eb5e9d8c r5:85448c00 r4:85448c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85448c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:8542d78c r4:8542d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eeec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542db8c r4:8542d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542db8c r4:851e9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544d400 r8:851e9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9e00 r8:80287e08 r7:eb5e9e60 r6:851e9e80 r5:8544d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4b00 INFO: task kworker/1:573:5061 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 99eda000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:854c5400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853b3b8c r4:853b3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:5066 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:854c6c00 r4:854c6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ab0c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb463000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542e38c r4:8542e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542e38c r4:851e9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c6c00 r8:851e9f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e9f00 r8:80287e08 r7:eb5ede60 r6:849e6580 r5:854c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab1c0 INFO: task kworker/1:574:5066 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9a3f6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8542eb8c r4:8542e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542eb8c r4:850f5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c3c00 r8:850f5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:5069 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000013 r6:eb605d8c r5:854c4800 r4:854c4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ab480 r5:8542df8c r4:8542dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542df8c r4:8529e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8529e000 r8:80287e08 r7:eb601e60 r6:849e6680 r5:854c4800 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:577:5071 blocked for more than 455 seconds. r4:854c0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542cf8c r4:8542cc00 r7:ddde2d80 r6:83018200 r5:8542cf8c r4:8529e080 r4:8529e080 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab500 INFO: task kworker/1:577:5071 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9a99a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:5073 blocked for more than 455 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:854b6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8542f78c r4:8542f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542f78c r4:8529e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb5f1d84 r8:00000002 r7:60000113 r6:eb5f1d8c r5:8544c800 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8542f38c r4:8542f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542f38c r4:8529e180 r10:00000000 r9:8529e180 r8:80287e08 r7:eb611e60 r6:8529e200 r5:8544c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab540 INFO: task kworker/1:579:5074 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9ae3c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542ff8c r4:8542fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542ff8c r4:8529e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb615fb0 to 0xeb615ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:581:5079 blocked for more than 455 seconds. r4:8544e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8542ef8c r4:8542ec00 r7:ddde2d80 r6:83018200 r5:8542ef8c r4:8529e380 r10:61c88647 r9:8544e000 r8:8529e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e380 r8:80287e08 r7:eb615e60 r6:8529e400 r5:8544e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab880 INFO: task kworker/1:581:5079 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9b3a5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:5081 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:8544a400 r4:8544a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8544a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8542c78c r4:8542c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542c78c r4:8529e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8544a400 r8:8529e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e600 r8:80287e08 r7:eb615e60 r6:8529e680 r5:8544a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852abdc0 INFO: task kworker/1:582:5081 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9b3a5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:83880c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852abec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83880c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb631000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541fb8c r4:8541f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:8529e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83880c00 r8:8529e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e480 r8:80287e08 r7:eb621e60 r6:8529e500 r5:83880c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab880 INFO: task kworker/1:583:5084 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9b5f2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:584:5085 blocked for more than 456 seconds. r10:8291a684 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:8543e000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb653000 r5:854acb8c r4:854ac800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854acb8c r4:8529e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543e000 r8:8529e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8529e580 r8:80287e08 r7:eb629e60 r6:8529e700 r5:8543e000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a4a40 INFO: task kworker/1:584:5085 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9b972000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:5087 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb63dd84 r8:00000002 r7:60000013 r6:eb63dd8c r5:85450000 r4:85450000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85450000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85450000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:eb63f000 r5:8542678c r4:85426400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542678c r4:8529e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85450000 r8:8529e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e780 r8:80287e08 r7:eb635e60 r6:8529e800 r5:85450000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xeb291d28 to 0xeb291d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:5089 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb649d84 r8:00000002 r7:60000013 r6:eb649d8c r5:85450c00 r4:85450c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85450c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85450c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac38c r4:854ac000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ac38c r4:8529e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85450c00 r8:8529e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e880 r8:80287e08 r7:eb635e60 r6:8529e900 r5:85450c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c51c0 INFO: task kworker/1:586:5089 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9bc7c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:5091 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:85451800 r4:85451800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85451800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:854ad38c r4:854ad000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ad38c r4:8529e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85451800 r8:8529e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e980 r8:80287e08 r7:eb635e60 r6:8529ea00 r5:85451800 Exception stack(0xeb651fb0 to 0xeb651ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9c147000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:5093 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000013 r6:eb65dd8c r5:85452400 r4:85452400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85452400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85452400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb659000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854acf8c r4:854acc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854acf8c r4:8529ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85452400 r8:8529eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ea80 r8:80287e08 r7:eb651e60 r6:8529eb00 r5:85452400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c53c0 INFO: task kworker/1:588:5093 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9c4c9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:5095 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85453000 r4:85453000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85453000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85453000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ad78c r4:854ad400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ad78c r4:8529eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85453000 r8:8529ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529eb80 r8:80287e08 r7:eb651e60 r6:8529ec00 r5:85453000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c53c0 INFO: task kworker/1:589:5095 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9c4c9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:5097 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:85454800 r4:85454800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85454800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bce40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85454800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb677000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1b8c r4:853b1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1b8c r4:849e6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85454800 r8:849e682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6800 r8:80287e08 r7:eb3b5e60 r6:8529ed00 r5:85454800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bca40 INFO: task kworker/0:394:5097 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9c8d4000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:5098 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:85455400 r4:85455400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85455400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85455400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ae38c r4:854ae000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ae38c r4:8529ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85455400 r8:8529ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ec80 r8:80287e08 r7:eb665e60 r6:8529ed80 r5:85455400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c5380 INFO: task kworker/1:590:5098 is blocked on a mutex likely owned by task kworker/1:480:4781. Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:5101 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:85456000 r4:85456000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85456000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eae00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85456000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb763000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fcf8c r4:854fcc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854fcf8c r4:849e6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456000 r8:849e68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6880 r8:80287e08 r7:eb3b5e60 r6:8529ef00 r5:85456000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bcd40 INFO: task kworker/0:395:5101 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9ca28000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:5103 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:85456c00 r4:85456c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85456c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ea900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85456c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ed78c r4:847ed400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ed78c r4:849e6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85456c00 r8:849e692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6900 r8:80287e08 r7:eb695e60 r6:8529ee00 r5:85456c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bcc40 INFO: task kworker/0:396:5103 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9cf32000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:5105 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:5105 tgid:5105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:85453c00 r4:85453c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85453c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85453c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb691000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac78c r4:854ac400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ac78c r4:8529ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85453c00 r8:8529eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8529ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ee80 r8:80287e08 r7:eb685e60 r6:8529ef80 r5:85453c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c58c0 INFO: task kworker/1:591:5105 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9cf32000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:5107 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85458000 r4:85458000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85458000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85458000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ae78c r4:854ae400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ae78c r4:852cf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85458000 r8:852cf02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf000 r8:80287e08 r7:eb685e60 r6:852cf080 r5:85458000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c5cc0 INFO: task kworker/1:592:5107 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9d3e1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:5109 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:85458c00 r4:85458c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85458c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85458c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aeb8c r4:854ae800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aeb8c r4:852cf180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85458c00 r8:852cf1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf180 r8:80287e08 r7:eb69de60 r6:852cf200 r5:85458c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852abb80 INFO: task kworker/1:593:5109 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9dbb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:5111 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:85459800 r4:85459800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85459800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5140 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85459800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adb8c r4:854ad800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854adb8c r4:852cf100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85459800 r8:852cf12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf100 r8:80287e08 r7:eb6a9e60 r6:852cf280 r5:85459800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852abac0 INFO: task kworker/1:594:5111 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9dbb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:5113 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:8545a400 r4:8545a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854af78c r4:854af400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854af78c r4:852cf300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545a400 r8:852cf32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf300 r8:80287e08 r7:eb6b1e60 r6:852cf380 r5:8545a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e5780 INFO: task kworker/1:595:5113 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9dbb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:5115 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:8545b000 r4:8545b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adf8c r4:854adc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854adf8c r4:852cf400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545b000 r8:852cf42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf400 r8:80287e08 r7:eb6bde60 r6:852cf480 r5:8545b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5300 INFO: task kworker/1:596:5115 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9e004000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:5117 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000013 r6:eb6d1d8c r5:8545bc00 r4:8545bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d53c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aef8c r4:854aec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aef8c r4:852cf500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545bc00 r8:852cf52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf500 r8:80287e08 r7:eb6bde60 r6:852cf580 r5:8545bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d51c0 INFO: task kworker/1:597:5117 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9e33e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:5120 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6d9d84 r8:00000002 r7:60000013 r6:eb6d9d8c r5:8545c800 r4:8545c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d55c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aff8c r4:854afc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854aff8c r4:852cf600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545c800 r8:852cf62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf600 r8:80287e08 r7:eb6d1e60 r6:852cf680 r5:8545c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5580 INFO: task kworker/1:598:5120 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9e33e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:5121 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:8545d400 r4:8545d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0073000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542e78c r4:8542e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542e78c r4:852cf700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545d400 r8:852cf72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf700 r8:80287e08 r7:eb6d9e60 r6:852cf780 r5:8545d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5480 INFO: task kworker/1:599:5121 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9e56e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:5123 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:8545e000 r4:8545e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854afb8c r4:854af800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854afb8c r4:852cf800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545e000 r8:852cf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf800 r8:80287e08 r7:eb6e5e60 r6:852cf880 r5:8545e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d54c0 INFO: task kworker/1:600:5123 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9e96f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:5125 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:8545ec00 r4:8545ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8545ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab39000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f438c r4:854f4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f438c r4:852cf900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545ec00 r8:852cf92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cf900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cf900 r8:80287e08 r7:eb569e60 r6:852cf980 r5:8545ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5940 INFO: task kworker/1:601:5125 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9eccb000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:5127 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:85380000 r4:85380000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85380000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d59c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85380000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542fb8c r4:8542f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542fb8c r4:852cfa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85380000 r8:852cfa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cfa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cfa00 r8:80287e08 r7:eb571e60 r6:852cfa80 r5:85380000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5ac0 INFO: task kworker/1:602:5127 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9eccb000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:5129 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb58dd84 r8:00000002 r7:60000113 r6:eb58dd8c r5:85380c00 r4:85380c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85380c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d5cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85380c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f4b8c r4:854f4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f4b8c r4:852cfb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85380c00 r8:852cfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cfb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cfb00 r8:80287e08 r7:eb571e60 r6:852cfb80 r5:85380c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5ac0 INFO: task kworker/1:603:5129 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9f151000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85381800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:854f538c r4:854f5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f538c r4:852cfc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85381800 r8:852cfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cfc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cfc00 r8:80287e08 r7:eb58de60 r6:852cfc80 r5:85381800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d5c80 INFO: task kworker/1:604:5131 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9f26f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:5133 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85382400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r9:83018205 r8:85382400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:854f578c r4:854f5400 r7:ddde2d80 r6:83018200 r5:854f578c r4:852cfd00 r10:00000000 r9:852cfd00 r8:80287e08 r7:eb591e60 r6:852cfd80 r5:85382400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:5135 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:85383000 r4:85383000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85383000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85383000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f5f8c r4:854f5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f5f8c r4:852cfe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85383000 r8:852cfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cfe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cfe00 r8:80287e08 r7:eb6e9e60 r6:852cfe80 r5:85383000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bcf00 INFO: task kworker/1:606:5135 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 9fa81000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:5136 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:5136 tgid:5136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85383c00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854f478c r4:854f4400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f478c r4:852cff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:852cff00 5fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:5138 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6f9d84 r8:00000002 r7:60000013 r6:eb6f9d8c r5:85385400 r4:85385400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85385400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85385400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f4f8c r4:854f4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f4f8c r4:850e0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85385400 r8:850e002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0000 r8:80287e08 r7:eb6ede60 r6:850e0080 r5:85385400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:5140 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:5140 tgid:5140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000013 r6:eb6fdd8c r5:85386c00 r4:85386c00 r5:85386c00 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f638c r4:854f6000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f638c r4:850e0100 r10:61c88647 r9:85386c00 r8:850e012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85520000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:854f6f8c r4:854f6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f6f8c r4:850e0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85520000 r8:850e022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0200 r8:80287e08 r7:eb6fde60 r6:850e0280 r5:85520000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349680 INFO: task kworker/1:610:5144 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a07f0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85520c00 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f678c r4:854f6400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85520c00 r8:850e032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85349780 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:854f6b8c r4:854f6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85521800 r8:850e042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0400 r8:80287e08 r7:eb705e60 r6:850e0480 r5:85521800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85349900 INFO: task kworker/1:612:5148 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a0ec8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:5149 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:85523000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r5:00001000 r4:eb6e1000 r5:853b338c r4:853b3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b338c r4:849e6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb70dfb0 to 0xeb70dff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:85524800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854f778c r4:854f7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85524800 r8:850e05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a1457000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:5154 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb71dd84 r8:00000002 r7:60000013 r6:eb71dd8c r5:85522400 r4:85522400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85522400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c500 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85522400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb353000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854f7f8c r4:854f7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f7f8c r4:850e0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850e0680 r8:80287e08 r7:eb719e60 r6:850e0700 r5:85522400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:615:5156 blocked for more than 456 seconds. r4:85525400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85525400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f5b8c r4:854f5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f5b8c r4:850e0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85525400 r8:850e07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0780 r8:80287e08 r7:eb71de60 r6:850e0800 r5:85525400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535c300 INFO: task kworker/1:615:5156 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a1bd9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854af38c r4:854af000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8535c4c0 INFO: task kworker/1:616:5159 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a1bd9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:854fc38c r4:854fc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fc38c r4:850e0980 r10:61c88647 r9:85526c00 r8:850e09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/1:618 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:854fcb8c r4:854fc800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85523c00 r8:850e0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a22b5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:5164 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb725d84 r8:00000002 r7:60000013 r6:eb725d8c r5:85386000 r4:85386000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85386000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535cb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85386000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb447000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fd38c r4:854fd000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fd38c r4:850e0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85386000 r8:850e0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0b80 r8:80287e08 r7:eb721e60 r6:850e0c00 r5:85386000 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8484cc40 task:kworker/1:620 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r5:00001000 r4:eb4c9000 r5:854fd78c r4:854fd400 r7:ddde2d80 r6:83018200 r5:854fd78c r4:850e0c80 r10:00000000 r9:850e0c80 r8:80287e08 r7:eb725e60 r6:850e0d00 r5:85384800 Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535cac0 INFO: task kworker/1:620:5166 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a2946000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:5168 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000013 r6:eb72dd8c r5:85548000 r4:85548000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85548000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ca40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854fdb8c r4:854fd800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fdb8c r4:850e0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548000 r8:850e0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0d80 r8:80287e08 r7:eb729e60 r6:850e0e00 r5:85548000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535c940 INFO: task kworker/1:621:5168 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a2946000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5170 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:85548c00 r4:85548c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85548c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85548c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb533000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ecb8c r4:847ec800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ecb8c r4:850e0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85548c00 r8:850e0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e0e80 r8:80287e08 r7:eb72de60 r6:850e0f00 r5:85548c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8535cc00 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:5171 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Call trace: r5:85549800 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535cf00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85549800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fc78c r4:854fc400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fc78c r4:85529000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85549800 r8:8552902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529000 r8:80287e08 r7:eb731e60 r6:85529080 r5:85549800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8535cf80 INFO: task kworker/1:623:5171 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8554bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:854fdf8c r4:854fdc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8554bc00 r8:8552912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5176 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:625 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:8554a400 r4:8554a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8554a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fe78c r4:854fe400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fe78c r4:85529200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554a400 r8:8552922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529200 r8:80287e08 r7:eb73de60 r6:85529280 r5:8554a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552a3c0 INFO: task kworker/1:625:5176 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:626:5177 blocked for more than 456 seconds. r4:8554c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854feb8c r4:854fe800 r7:ddde2d80 r6:83018200 r5:854feb8c r4:85529300 r10:61c88647 r9:8554c800 r8:8552932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:5180 blocked for more than 456 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb745d84 r8:00000002 r7:60000013 r6:eb745d8c r5:8554d400 r4:8554d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8554d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb573000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fef8c r4:854fec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fef8c r4:85529400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554d400 r8:8552942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529400 r8:80287e08 r7:eb741e60 r6:85529480 r5:8554d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552a7c0 INFO: task kworker/1:627:5180 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a3d8a000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:628:5182 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5182 tgid:5182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb749d84 r8:00000002 r7:60000013 r6:eb749d8c r5:8554e000 r4:8554e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8554e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb583000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ff38c r4:854ff000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ff38c r4:85529500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554e000 r8:8552952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529500 r8:80287e08 r7:eb745e60 r6:85529580 r5:8554e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552a6c0 INFO: task kworker/1:628:5182 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a3d8a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ffb8c r4:854ff800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5187 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb755d84 r8:00000002 r7:60000013 r6:eb755d8c r5:84470c00 r4:84470c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84470c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84470c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fe38c r4:854fe000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854fe38c r4:85529700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84470c00 r8:8552972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529700 r8:80287e08 r7:eb74de60 r6:85529780 r5:84470c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552a980 INFO: task kworker/1:630:5187 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a4625000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000113 r6:eb75dd8c r5:84471800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ff78c r4:854ff400 r10:61c88647 r9:84471800 r8:8552982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552a780 INFO: task kworker/1:631:5188 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a4625000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:5191 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000013 r6:eb751d8c r5:854cb000 r4:854cb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ecf8c r4:847ecc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ecf8c r4:849e6a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cb000 r8:849e6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6a80 r8:80287e08 r7:eb695e60 r6:849e6b00 r5:854cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ea200 INFO: task kworker/0:398:5191 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a4ce8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:5192 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:854c9800 r4:854c9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855311c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb791000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a138c r4:853a1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a138c r4:849e6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c9800 r8:849e6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6b80 r8:80287e08 r7:eb751e60 r6:849e6c00 r5:854c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ea5c0 INFO: task kworker/0:399:5192 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a51b7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r4:854cc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f7b8c r4:854f7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f7b8c r4:85529a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cc800 r8:85529a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529a00 r8:80287e08 r7:eb75de60 r6:849e6c80 r5:854cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552afc0 INFO: task kworker/1:632:5194 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a54b5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eb291dc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:5196 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:854cd400 r4:854cd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552e0c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550838c r4:85508000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550838c r4:85529a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cd400 r8:85529aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529a80 r8:80287e08 r7:eb775e60 r6:849e6d00 r5:854cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:854ce000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85508b8c r4:85508800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85508b8c r4:85529b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ce000 r8:85529b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529b00 r8:80287e08 r7:eb781e60 r6:849e6d80 r5:854ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552e080 INFO: task kworker/1:634:5198 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a57ec000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:5200 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550938c r4:85509000 r7:ddde2d80 r6:83018200 r5:8550938c r4:85529b80 r10:00000000 r9:85529b80 r8:80287e08 r7:eb789e60 r6:85529c00 r5:84473000 r4:8552e300 Call trace: 1d20: a5c24000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:84472400 r5:84472400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ee80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84472400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550978c r4:85509400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550978c r4:85529c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84472400 r8:85529cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529c80 r8:80287e08 r7:eb795e60 r6:85529d00 r5:84472400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552e400 INFO: task kworker/1:636:5201 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a5edc000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:400:5203 blocked for more than 457 seconds. r5:84474800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548478c r4:85484400 r7:dddced80 r6:83018000 r5:8548478c r4:849e6e00 r10:00000000 r9:849e6e00 r8:80287e08 r7:eb751e60 r6:85529d80 r5:84474800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:5205 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:5205 tgid:5205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84473c00 r4:84473c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84473c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855318c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84473c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85485b8c r4:85485800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85485b8c r4:849e6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84473c00 r8:849e6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85508f8c r4:849e6f00 r10:00000000 r9:849e6f00 r8:80287e08 r7:eb7bde60 r6:85529e80 r5:84476000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5209 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5209 tgid:5209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d5d84 r8:00000002 r7:60000113 r6:eb7d5d8c r5:84476c00 r4:84476c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84476c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531a40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84476c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548538c r4:85485000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548538c r4:849e6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84476c00 r8:849e6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849e6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6f80 r8:80287e08 r7:eb7bde60 r6:85529f00 r5:84476c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855315c0 INFO: task kworker/0:403:5209 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a6a0d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552e640 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550a38c r4:8550a000 r7:ddde2d80 r6:83018200 r5:8550a38c r4:85529f80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:5214 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:854ca400 r4:854ca400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ca400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535cfc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7eb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550a78c r4:8550a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550a78c r4:85529980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ca400 r8:855299ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85529980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85529980 r8:80287e08 r7:eb7d1e60 r6:849e6a00 r5:854ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552ec40 INFO: task kworker/1:638:5214 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a6d0d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:854cec00 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550ab8c r4:8550a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8536e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e000 r8:80287e08 r7:eb7f5e60 r6:85530000 r5:854cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552ac80 INFO: task kworker/1:639:5217 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a6d0d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 task:kworker/1:640 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb807000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550b38c r4:8550b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550b38c r4:8536e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8000 r8:8536e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e100 r8:80287e08 r7:eb801e60 r6:85530080 r5:854c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552d180 INFO: task kworker/1:640:5218 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854c6000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85509b8c r4:85509800 r7:ddde2d80 r6:83018200 r5:85509b8c r4:8536e080 r10:61c88647 r9:854c6000 r8:8536e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xeb81dfb0 to 0xeb81dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:5222 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:854c8c00 r4:854c8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85484b8c r4:85484800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85484b8c r4:8536e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8c00 r8:8536e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e180 r8:80287e08 r7:eb81de60 r6:85530300 r5:854c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552d280 INFO: task kworker/1:642:5222 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a762a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:5224 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:5224 tgid:5224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb82dd84 r8:00000002 r7:60000113 r6:eb82dd8c r5:854cbc00 r4:854cbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:854cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb849000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550bb8c r4:8550b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550bb8c r4:8536e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cbc00 r8:8536e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e200 r8:80287e08 r7:eb829e60 r6:85530380 r5:854cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552d380 INFO: task kworker/1:643:5224 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a762a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:644:5225 blocked for more than 457 seconds. r4:85370000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85370000 r8:8536e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5227 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:85370c00 r4:85370c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85370c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85370c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85484f8c r4:85484c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484f8c r4:85530480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85370c00 r8:855304ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530480 r8:80287e08 r7:eb7bde60 r6:85530500 r5:85370c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531ec0 INFO: task kworker/0:404:5227 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a7ee7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 INFO: task kworker/0:405:5230 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r4:85372400 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e08d7000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548778c r4:85487400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548778c r4:85530580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85372400 r8:855305ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530580 r8:80287e08 r7:eb7a1e60 r6:85530600 r5:85372400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531ec0 INFO: task kworker/0:405:5230 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a8022000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5233 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb859d84 r8:00000002 r7:60000013 r6:eb859d8c r5:85373c00 r4:85373c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85373c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb859fb0 to 0xeb859ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:5234 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb865d84 r8:00000002 r7:60000013 r6:eb865d8c r5:85373000 r4:85373000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85373000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552d840 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85373000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85509f8c r4:85509c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85509f8c r4:8536e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85373000 r8:8536e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e380 r8:80287e08 r7:eb859e60 r6:85530700 r5:85373000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552d940 INFO: task kworker/1:646:5234 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a87af000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85374800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550878c r4:85508400 r10:61c88647 r9:85374800 r8:8536e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb86dfb0 to 0xeb86dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552d700 INFO: task kworker/1:647:5236 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a87af000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:5240 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb855d84 r8:00000002 r7:60000013 r6:eb855d8c r5:85375400 r4:85375400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85375400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85375400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85486b8c r4:85486800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85486b8c r4:85530980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85375400 r8:855309ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530980 r8:80287e08 r7:eb841e60 r6:85530a00 r5:85375400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552c880 INFO: task kworker/0:406:5240 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9221000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:5243 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:85376000 r4:85376000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85376000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ca00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85376000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0603000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85486f8c r4:85486c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85486f8c r4:85530a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85376000 r8:85530aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530a80 r8:80287e08 r7:eb841e60 r6:85530b00 r5:85376000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552c9c0 INFO: task kworker/0:407:5243 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9221000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:847b1800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a3b8c r4:853a3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847b1800 r8:85530bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552cac0 INFO: task kworker/0:408:5244 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9221000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:5245 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb885d84 r8:00000002 r7:60000013 r6:eb885d8c r5:847b0000 r4:847b0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c9c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab73000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548638c r4:85486000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548638c r4:85530c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b0000 r8:85530c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530c00 r8:80287e08 r7:eb881e60 r6:8536e500 r5:847b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552ccc0 INFO: task kworker/0:409:5245 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9661000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:5247 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:847b2400 r4:847b2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85487b8c r4:85487800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85487b8c r4:85530c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b2400 r8:85530cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530c80 r8:80287e08 r7:eb881e60 r6:8536e580 r5:847b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552ccc0 INFO: task kworker/0:410:5247 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9cf7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:5248 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:847b3c00 r4:847b3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cd000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb423000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550bf8c r4:8550bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550bf8c r4:8536e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b3c00 r8:8536e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536e600 r8:80287e08 r7:eb86de60 r6:8536e680 r5:847b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552dec0 INFO: task kworker/1:648:5248 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9cf7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548578c r4:85485400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548578c r4:85530d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b3000 r8:85530d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530d00 r8:80287e08 r7:eb881e60 r6:8536e700 r5:847b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552cdc0 INFO: task kworker/0:411:5251 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: a9cf7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:412 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85487f8c r4:85487c00 r7:dddced80 r6:83018000 r5:85487f8c r4:85530d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5254 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:847b4800 r4:847b4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548438c r4:85484000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548438c r4:85530e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b4800 r8:85530e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530e00 r8:80287e08 r7:eb881e60 r6:8536e800 r5:847b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552cdc0 INFO: task kworker/0:413:5254 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: aa42f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:414:5257 blocked for more than 457 seconds. r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:847b6c00 r4:847b6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549038c r4:85490000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549038c r4:85530e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b6c00 r8:85530eac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: aa42f000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:847b0c00 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107980 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549178c r4:85491400 r7:dddced80 r6:83018000 r5:8549178c r4:85530f00 r10:61c88647 r9:847b0c00 r8:85530f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107240 INFO: task kworker/0:415:5259 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: aa9c0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5260 blocked for more than 457 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:8554b000 r4:8554b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8554b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8554b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85490b8c r4:85490800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85490b8c r4:85530f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8554b000 r8:85530fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530f80 r8:80287e08 r7:eb8bde60 r6:8536e980 r5:8554b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107140 INFO: task kworker/0:416:5260 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: aad7b000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:5262 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:85376c00 r4:85376c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85376c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107580 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85376c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549138c r4:85491000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549138c r4:85530780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85376c00 r8:855307ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530780 r8:80287e08 r7:eb8bde60 r6:85530800 r5:85376c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107040 INFO: task kworker/0:417:5262 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ab1fc000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:418:5264 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c9d84 r8:00000002 r7:60000013 r6:eb8c9d8c r5:85371800 r4:85371800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85371800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851073c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85371800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549078c r4:85490400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549078c r4:85530880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85371800 r8:855308ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85530880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530880 r8:80287e08 r7:eb8bde60 r6:85530180 r5:85371800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107700 INFO: task kworker/0:418:5264 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ab1fc000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:5268 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000113 r6:eb8d5d8c r5:84991800 r4:84991800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84991800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cdc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84991800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49dd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558cb8c r4:8558c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558cb8c r4:8536ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84991800 r8:8536ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536ea00 r8:80287e08 r7:eb86de60 r6:85530200 r5:84991800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cd180 INFO: task kworker/1:649:5268 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ab610000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:5270 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:84990000 r4:84990000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84990000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cde00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84990000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb657000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f738c r4:854f7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854f738c r4:8536ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84990000 r8:8536eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536ea80 r8:80287e08 r7:eb8d5e60 r6:850e9000 r5:84990000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cd080 INFO: task kworker/1:650:5270 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ab610000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:5271 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d9d84 r8:00000002 r7:60000113 r6:eb8d9d8c r5:84992400 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107b80 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85491b8c r4:85491800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85491b8c r4:850e9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84992400 r8:850e90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9080 r8:80287e08 r7:eb8bde60 r6:850e9100 r5:84992400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107940 INFO: task kworker/0:419:5271 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ab9a0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:5273 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:84993000 r4:84993000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84993000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549238c r4:85492000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549238c r4:850e9200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84993000 r8:850e922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9200 r8:80287e08 r7:eb8d9e60 r6:850e9280 r5:84993000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107a80 INFO: task kworker/0:420:5273 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85552400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cbb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85552400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb687000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ec78c r4:847ec400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ec78c r4:850e9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85552400 r8:850e91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9180 r8:80287e08 r7:eb8cde60 r6:8536eb00 r5:85552400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85107880 INFO: task kworker/0:421:5275 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: abc64000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5277 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85553000 r5:85553000 r4:8291a680 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8549278c r4:85492400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549278c r4:850e9300 r10:00000000 r9:850e9300 r8:80287e08 r7:eb8e1e60 r6:8536eb80 r5:85553000 r4:85107c80 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:5279 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000113 r6:eb8f1d8c r5:85553c00 r4:85553c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85553c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85553c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85492b8c r4:85492800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85492b8c r4:850e9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85553c00 r8:850e93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9380 r8:80287e08 r7:eb8e1e60 r6:8536ec00 r5:85553c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cb1c0 INFO: task kworker/0:423:5279 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ac6f0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:5280 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:85551800 r4:85551800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85551800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85551800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85492f8c r4:85492c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85492f8c r4:850e9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85551800 r8:850e942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9400 r8:80287e08 r7:eb8e1e60 r6:8536ec80 r5:85551800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cb380 INFO: task kworker/0:424:5280 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: acc42000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:5282 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:85555400 r4:85555400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85555400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85555400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549338c r4:85493000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549338c r4:850e9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85555400 r8:850e95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9580 r8:80287e08 r7:eb8e1e60 r6:8536ed00 r5:85555400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cb000 INFO: task kworker/0:425:5282 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85491f8c r4:85491c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e9480 5fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:5286 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:85556000 r4:85556000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85556000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85556000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493b8c r4:85493800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85493b8c r4:850e9500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85556000 r8:850e952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9500 r8:80287e08 r7:eb8e1e60 r6:8536ee00 r5:85556000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cb580 INFO: task kworker/0:427:5286 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ad4b3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:5289 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:85554800 r4:85554800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85554800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cd40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85554800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r5:8558c38c r4:8558c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558c38c r4:8536ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85554800 r8:8536eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8536ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ad7ef000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:5291 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb911d84 r8:00000002 r7:60000113 r6:eb911d8c r5:85550c00 r4:85550c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85550c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb7c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85550c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb669000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85490f8c r4:85490c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85490f8c r4:850e9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85550c00 r8:850e962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ad7ef000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:429 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493f8c r4:85493c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85493f8c r4:850e9700 r10:61c88647 r9:85550000 r8:850e972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:5295 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:85378000 r4:85378000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85378000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cbc40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85378000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549438c r4:85494000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549438c r4:850e9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85378000 r8:850e96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9680 r8:80287e08 r7:eb8e1e60 r6:851e9f80 r5:85378000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cbac0 INFO: task kworker/0:430:5295 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: adaf3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5296 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r5:85378c00 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8549578c r4:85495400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85378c00 r8:850e982c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d20: adf52000 eafa9000 00000001 80239b98 7f439000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:5298 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:5298 tgid:5298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:8537a400 r4:8537a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb8c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85494b8c r4:85494800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85494b8c r4:850e9880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537a400 r8:850e98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9880 r8:80287e08 r7:eb925e60 r6:852b6080 r5:8537a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cbd80 INFO: task kworker/0:432:5298 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: adf52000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85379800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:8549538c r4:85495000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549538c r4:850e9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85379800 r8:850e97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9780 r8:80287e08 r7:eb925e60 r6:852b6100 r5:85379800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb939fb0 to 0xeb939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cbdc0 INFO: task kworker/0:433:5301 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ae549000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:5303 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:5303 tgid:5303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:8537b000 r4:8537b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r9:83018005 r8:8537b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:85495b8c r4:85495800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85495b8c r4:850e9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537b000 r8:850e992c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb941fb0 to 0xeb941ff8) Workqueue: events bpf_prog_free_deferred 1d20: ae549000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:435:5306 blocked for more than 458 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8549738c r4:85497000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549738c r4:850e9980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537c800 r8:850e99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9980 r8:80287e08 r7:eb941e60 r6:852b6200 r5:8537c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae300 INFO: task kworker/0:435:5306 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ae952000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:5307 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8537e000 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85495f8c r4:85495c00 r7:dddced80 r6:83018000 r5:85495f8c r4:850e9a00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/0:437:5308 blocked for more than 458 seconds. r10:8291a684 r9:eb95dd84 r8:00000002 r7:60000113 r6:eb95dd8c r5:8537d400 r4:8537d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549638c r4:85496000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549638c r4:850e9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537d400 r8:850e9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9a80 r8:80287e08 r7:eb94de60 r6:852b6300 r5:8537d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae000 INFO: task kworker/0:437:5308 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: aef64000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:5310 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:8537ec00 r4:8537ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8537ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8537ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549678c r4:85496400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549678c r4:850e9b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537ec00 r8:850e9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9b00 r8:80287e08 r7:eb94de60 r6:852b6380 r5:8537ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:852ae5c0 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:439 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84470000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85494f8c r4:85494c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85494f8c r4:850e9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84470000 r8:850e9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9b80 r8:80287e08 r7:eb94de60 r6:852b6400 r5:84470000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae700 INFO: task kworker/0:439:5312 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: af4f7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5314 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5314 tgid:5314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb97dd84 r8:00000002 r7:60000013 r6:eb97dd8c r5:85460000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85496b8c r4:85496800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e9c00 Exception stack(0xeb97dfb0 to 0xeb97dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d20: af991000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:5317 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb995d84 r8:00000002 r7:60000013 r6:eb995d8c r5:85462400 r4:85462400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85462400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8549778c r4:85497400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549778c r4:850e9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85462400 r8:850e9cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e9c80 r8:80287e08 r7:eb94de60 r6:852b6500 r5:85462400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae840 INFO: task kworker/0:441:5317 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: af991000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85463000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 r5:8549478c r4:85494400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85463000 r8:850e9d2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b035f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5320 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85463c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85497b8c r4:85497800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85497b8c r4:850e9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85463c00 r8:850e9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e9d80 Exception stack(0xeb9adfb0 to 0xeb9adff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r4:00000000 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:853c5f8c r4:853c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85461800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:854a038c r4:854a0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a038c r4:850e9e00 r4:850e9e00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b085b000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:5326 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:85464800 r4:85464800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85464800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cf80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85464800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac01000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558cf8c r4:8558cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558cf8c r4:852b6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85464800 r8:852b672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b6700 r8:80287e08 r7:eb8d5e60 r6:852b6780 r5:85464800 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:85465400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529c6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85465400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558d38c r4:8558d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558d38c r4:852b6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85465400 r8:852b682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b6800 r8:80287e08 r7:eb99de60 r6:852b6880 r5:85465400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529cb40 INFO: task kworker/1:653:5328 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b0a83000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:654:5330 blocked for more than 458 seconds. Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85466000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:8558db8c r4:8558d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85466000 r8:852b692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529cb40 INFO: task kworker/1:654:5330 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b130d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 INFO: task kworker/1:655:5333 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:85466c00 r4:85466c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85466c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529c540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85466c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558d78c r4:8558d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558d78c r4:852b6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85466c00 r8:852b6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b6a00 r8:80287e08 r7:eb7e5e60 r6:852b6a80 r5:85466c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cd380 INFO: task kworker/1:655:5333 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: b19ac000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r4:eb291dc0 r4:00000000 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:853c5f8c r4:853c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: r5:85460c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558df8c r4:8558dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85460c00 r8:852b6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cd380 INFO: task kworker/1:656:5334 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b19ac000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:5336 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b9d84 r8:00000002 r7:60000013 r6:eb9b9d8c r5:847b5400 r4:847b5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847b5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cbd80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558e38c r4:8558e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558e38c r4:852b6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847b5400 r8:852b6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b6c00 r8:80287e08 r7:eb7f9e60 r6:852b6c80 r5:847b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529c280 INFO: task kworker/1:657:5336 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b1e5d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:5339 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:85468c00 r4:85468c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85468c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85468c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb197000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558e78c r4:8558e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558e78c r4:852b6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85468c00 r8:852b6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b6d00 r8:80287e08 r7:eb9b9e60 r6:852b6d80 r5:85468c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cbe80 INFO: task kworker/1:658:5339 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b2015000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:5340 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85469800 r4:85469800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85469800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85469800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85497f8c r4:85497c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85497f8c r4:850e9e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85469800 r8:850e9eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b2693000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:5342 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:5342 tgid:5342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8546b000 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8549378c r4:85493400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549378c r4:85530280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546b000 r8:855302ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85530280 r8:80287e08 r7:eb9b1e60 r6:852b6e80 r5:8546b000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018205 r8:8546bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:8558eb8c r4:8558e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558eb8c r4:852b6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546bc00 r8:852b6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b6f00 r10:00000000 r9:852b6f00 r8:80287e08 r7:eb9c1e60 r6:852b6f80 r5:8546bc00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ea040 INFO: task kworker/1:659:5344 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b274f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5347 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8546a400 r4:8546a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8546a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558f78c r4:8558f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558f78c r4:852a1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546a400 r8:852a102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1000 r8:80287e08 r7:eb9d1e60 r6:852a1080 r5:8546a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ea400 INFO: task kworker/1:660:5347 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b2bf5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:5348 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:8546c800 r4:8546c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8546c800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558f38c r4:8558f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558f38c r4:852a1100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546c800 r8:852a112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1100 r8:80287e08 r7:eb9c9e60 r6:852a1180 r5:8546c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ea5c0 INFO: task kworker/1:661:5348 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b31d1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 INFO: task kworker/1:662:5350 blocked for more than 458 seconds. r4:8546d400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018205 r8:8546d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:8558c78c r4:8558c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558c78c r4:852a1280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546d400 r8:852a12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1280 r8:80287e08 r7:eb9c9e60 r6:852a1300 r5:8546d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d5fb0 to 0xeb9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ea7c0 INFO: task kworker/1:662:5350 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b34f8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:5351 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:8546e000 r4:8546e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558fb8c r4:8558f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558fb8c r4:852a1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:852a1200 dfa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d9d84 r8:00000002 r7:60000013 r6:eb9d9d8c r5:8546ec00 r4:8546ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eab80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8546ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558ff8c r4:8558fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558ff8c r4:852a1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546ec00 r8:852a142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1400 r8:80287e08 r7:eb9d5e60 r6:852a1480 r5:8546ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d9fb0 to 0xeb9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851eab40 INFO: task kworker/1:664:5354 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b39a4000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eac00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8537bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558ef8c r4:8558ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558ef8c r4:852a1500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8537bc00 r8:852a152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1500 r8:80287e08 r7:eb9d5e60 r6:852a1580 r5:8537bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851eac40 INFO: task kworker/1:665:5357 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b3f36000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:5359 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:5359 tgid:5359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:855c8c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85599f8c r4:85599c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85599f8c r4:852b8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:5360 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:855c9800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eae80 r5:8443e38c r4:8443e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443e38c r4:852a1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c9800 r8:852a16ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:852a1680 r8:80287e08 r7:eb9d5e60 r6:852a1700 r5:855c9800 r4:851eae00 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:667:5361 blocked for more than 458 seconds. Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559878c r4:85598400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559878c r4:852a1780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84996c00 r8:852a17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1780 r8:80287e08 r7:eb9d5e60 r6:852b8080 r5:84996c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ea6c0 INFO: task kworker/1:667:5361 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b4815000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:5364 blocked for more than 458 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9fdd84 r8:00000002 r7:60000013 r6:eb9fdd8c r5:84994800 r4:84994800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84994800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ba300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85598f8c r4:85598c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84994800 r8:852a182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb9fdfb0 to 0xeb9fdff8) Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000113 r6:eba09d8c r5:84995400 r4:84995400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84995400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ba280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84995400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb575000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559838c r4:85598000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559838c r4:852a1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84995400 r8:852a18ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1880 r8:80287e08 r7:eb9fde60 r6:852b8180 r5:84995400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ba100 INFO: task kworker/1:669:5367 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b5217000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eba0dd84 r8:00000002 r7:60000013 r6:eba0dd8c r5:84990c00 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8559938c r4:85599000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84990c00 r8:852a192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1900 r8:80287e08 r7:eb9fde60 r6:852b8200 r5:84990c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba0dfb0 to 0xeba0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ba3c0 INFO: task kworker/1:670:5368 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b5217000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:671:5369 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:855ca400 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85598b8c r4:85598800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85598b8c r4:852a1980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ca400 r8:852a19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:672 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85599b8c r4:85599800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855cb000 r8:852a1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1a80 r8:80287e08 r7:eb9fde60 r6:852a1b00 r5:855cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ba400 INFO: task kworker/1:672:5372 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b58ba000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:5374 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:855cbc00 r4:855cbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855cbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852baa80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559a38c r4:8559a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559a38c r4:852a1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cbc00 r8:852a1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1b80 r8:80287e08 r7:eb9fde60 r6:852a1c00 r5:855cbc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: b5d3b000 eafa9000 00000001 80239b98 7f439000 00000001 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:674:5376 blocked for more than 459 seconds. Call trace: r10:8291a684 r9:eba19d84 r8:00000002 r7:60000113 r6:eba19d8c r5:855cc800 r4:855cc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855cc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bac00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559a78c r4:8559a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559a78c r4:852a1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cc800 r8:852a1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1c80 r8:80287e08 r7:eba15e60 r6:852a1d00 r5:855cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852baa40 INFO: task kworker/1:674:5376 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:675:5378 blocked for more than 459 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852baf00 r5:8559af8c r4:8559ac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559af8c r4:852a1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cd400 r8:852a1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1d80 r8:80287e08 r7:eba19e60 r6:852a1e00 r5:855cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ba980 INFO: task kworker/1:675:5378 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b6142000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:5381 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:855ce000 r4:855ce000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ce000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:855ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:8559bf8c r4:8559bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559bf8c r4:852a1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ce000 r8:852a1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1e80 r8:80287e08 r7:eb9f5e60 r6:852a1f00 r5:855ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852baec0 INFO: task kworker/1:676:5381 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:855cec00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85496f8c r4:85496c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85496f8c r4:852b8280 r10:61c88647 r9:855cec00 r8:852b82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852adfc0 INFO: task kworker/0:448:5382 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b6737000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:850f5d80 r4:00000001 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559b78c r4:8559b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559b78c r4:850e4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85351100 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb291fb0 to 0xeb291ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:855d8000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854a0b8c r4:854a0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8473c700 INFO: task kworker/0:449:5388 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b732e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:5390 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:855da400 r4:855da400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855da400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855da400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a0f8c r4:854a0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a0f8c r4:852b8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855da400 r8:852b83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8380 r8:80287e08 r7:eb895e60 r6:850e4300 r5:855da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852aed00 INFO: task kworker/0:450:5390 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:5391 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8e5d84 r8:00000002 r7:60000113 r6:eb8e5d8c r5:855d8c00 r4:855d8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a138c r4:854a1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a138c r4:852b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d8c00 r8:852b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8400 r8:80287e08 r7:eb8ade60 r6:850e4380 r5:855d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852ad940 Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b7951000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:5394 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:5394 tgid:5394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:855d9800 r4:855d9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eab40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a078c r4:854a0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a078c r4:852b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:453 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:855dc800 r4:855dc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8140 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf41000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a1b8c r4:854a1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a1b8c r4:852b8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dc800 r8:852b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8500 r8:80287e08 r7:eb8ade60 r6:850e4480 r5:855dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c81c0 INFO: task kworker/0:453:5395 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b7c3b000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 INFO: task kworker/0:454:5397 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eba2dd84 r8:00000002 r7:60000113 r6:eba2dd8c r5:855dbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a178c r4:854a1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a178c r4:852b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dbc00 r8:852b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8580 r8:80287e08 r7:eb8ade60 r6:850e4500 r5:855dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8200 INFO: task kworker/0:454:5397 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b8035000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:678:5398 blocked for more than 459 seconds. r4:855db000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855db000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:854a5f8c r4:854a5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a5f8c r4:850e4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855db000 r8:850e45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e4580 r8:80287e08 r7:eba1de60 r6:850e4600 r5:855db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351a40 INFO: task kworker/1:678:5398 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b8035000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r5:854a2b8c r4:854a2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852b8600 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b860e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:5402 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:5402 tgid:5402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:855de000 r4:855de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855de000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a278c r4:854a2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a278c r4:852b8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855de000 r8:852b86ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:5404 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:855e0c00 r4:855e0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a1f8c r4:854a1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a1f8c r4:852b8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e0c00 r8:852b872c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:852c8580 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:458:5406 blocked for more than 459 seconds. r10:8291a684 r9:eba51d84 r8:00000002 r7:60000013 r6:eba51d8c r5:855e0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r4:00000000 r5:854a238c r4:854a2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a238c r4:852b8880 r4:852b8880 Exception stack(0xeba51fb0 to 0xeba51ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:855e3000 r4:855e3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8580 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a338c r4:854a3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a338c r4:852b8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e3000 r8:852b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8780 r8:80287e08 r7:eba39e60 r6:850e4880 r5:855e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba59fb0 to 0xeba59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8580 INFO: task kworker/0:459:5408 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b93ce000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:5410 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba61d84 r8:00000002 r7:60000013 r6:eba61d8c r5:855e2400 r4:855e2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84744440 r5:854a538c r4:854a5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a538c r4:852b8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e2400 r8:852b882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8800 r8:80287e08 r7:eba39e60 r6:850e4900 r5:855e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8a40 INFO: task kworker/0:460:5410 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b93ce000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:5412 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:855e4800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a3b8c r4:854a3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855e4800 r8:852b89ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855e3c00 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a3f8c r4:854a3c00 r7:dddced80 r6:83018000 r5:854a3f8c r4:852b8900 r10:61c88647 r9:855e3c00 r8:852b892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8900 r8:80287e08 r7:eba61e60 r6:850e4a00 r5:855e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8b80 INFO: task kworker/0:462:5414 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: b9896000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:5416 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:855e1800 r4:855e1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548738c r4:85487000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548738c r4:852b8a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:852b8a00 r8:80287e08 r7:eba61e60 r6:850e4a80 r5:855e1800 r4:852c89c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:464:5418 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:5418 tgid:5418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:855e5400 r4:855e5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847edb8c r4:847ed800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847edb8c r4:852b8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e5400 r8:852b8b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8b00 r8:80287e08 r7:eba61e60 r6:850e4b00 r5:855e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c700 INFO: task kworker/0:464:5418 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ba144000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:855dec00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a438c r4:854a4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a438c r4:852b8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dec00 r8:852b8bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8b80 r8:80287e08 r7:eba61e60 r6:850e4b80 r5:855dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744080 INFO: task kworker/0:465:5420 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ba4b1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:5422 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba91d84 r8:00000002 r7:60000013 r6:eba91d8c r5:855e8c00 r4:855e8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a4b8c r4:854a4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a4b8c r4:852b8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ba5b6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:5424 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:855e8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84744f80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a6f8c r4:854a6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a6f8c r4:852b8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8000 r8:852b8c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8c00 r8:80287e08 r7:eba61e60 r6:850e4c80 r5:855e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744300 INFO: task kworker/0:467:5424 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ba5b6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/0:468:5426 blocked for more than 459 seconds. Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84993c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:854a578c r4:854a5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852b8c80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:5429 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:84996000 r4:84996000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84996000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84744400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84996000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a4f8c r4:854a4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a4f8c r4:852b8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84996000 r8:852b8dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8d80 r8:80287e08 r7:eba99e60 r6:852b8e00 r5:84996000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba9dfb0 to 0xeba9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744700 INFO: task kworker/0:469:5429 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bafcb000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85468000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854a5b8c r4:854a5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85468000 r8:852b8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8e80 r8:80287e08 r7:eba99e60 r6:852b8f00 r5:85468000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744300 INFO: task kworker/0:470:5430 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bafcb000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:5432 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:83b20c00 r4:83b20c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b20c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a7b8c r4:854a7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a7b8c r4:850e9f00 r10:61c88647 r9:83b20c00 r8:850e9f2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559ab8c r4:8559a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e4d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e4d00 r8:80287e08 r7:eba31e60 r6:850e4d80 r5:855e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa5fb0 to 0xebaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483d400 INFO: task kworker/1:679:5435 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bb455000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5436 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:855eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854a678c r4:854a6400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a678c r4:850e4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/1:681 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854fff8c r4:854ffc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483d740 INFO: task kworker/1:681:5438 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bbb15000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:5441 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:855ed400 r4:855ed400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ed400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854a738c r4:854a7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a738c r4:84846100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84846100 Exception stack(0xebab5fb0 to 0xebab5ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855ec800 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a7f8c r4:854a7c00 r7:dddced80 r6:83018000 r5:854a7f8c r4:84846080 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bbe0f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:5445 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:5445 tgid:5445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:855ea400 r4:855ea400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ea400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84180000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a478c r4:854a4400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a478c r4:84846000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ea400 r8:8484602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846000 r8:80287e08 r7:ebabde60 r6:850e4100 r5:855ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744300 INFO: task kworker/0:474:5445 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bc245000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:854a638c r4:854a6000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84846180 r8:80287e08 r7:ebac5e60 r6:84a1a000 r5:855ee000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:5448 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad1d84 r8:00000002 r7:60000013 r6:ebad1d8c r5:855e6000 r4:855e6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84180640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a838c r4:854a8000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a838c r4:84846200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6000 r8:8484622c r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:841800c0 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:854a778c r4:854a7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:5452 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:5452 tgid:5452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae1d84 r8:00000002 r7:60000013 r6:ebae1d8c r5:855f0c00 r4:855f0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841803c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a378c r4:854a3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a378c r4:84846300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f0c00 r8:8484632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846300 r8:80287e08 r7:ebad1e60 r6:84a1a180 r5:855f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84180080 INFO: task kworker/0:478:5452 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bcc32000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:5454 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:855f0000 r4:855f0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84180440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ad000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a6b8c r4:854a6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a6b8c r4:84846380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f0000 r8:848463ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846380 r8:80287e08 r7:ebad1e60 r6:84a1a200 r5:855f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84180480 INFO: task kworker/0:479:5454 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bcc32000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 INFO: task kworker/0:480:5457 blocked for more than 459 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaedd84 r8:00000002 r7:60000113 r6:ebaedd8c r5:855f2400 r4:855f2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854a8f8c r4:854a8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a8f8c r4:84846400 r10:61c88647 r9:855f2400 r8:8484642c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: bce69000 eafa9000 00000001 80239b98 7f439000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854a8b8c r4:854a8800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bd174000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:5461 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000013 r6:ebaf5d8c r5:855f3c00 r4:855f3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84180740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4db000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a978c r4:854a9400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a978c r4:84846500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f3c00 r8:8484652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846500 r8:80287e08 r7:ebaede60 r6:84a1a380 r5:855f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84180740 INFO: task kworker/0:482:5461 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bd174000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:5463 blocked for more than 460 seconds. [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:854a878c r4:854a8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a878c r4:84846580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84846580 Exception stack(0xebaf9fb0 to 0xebaf9ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:5465 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000013 r6:ebb01d8c r5:855f6000 r4:855f6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84180700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a9b8c r4:854a9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a9b8c r4:84846600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f6000 r8:8484662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846600 r8:80287e08 r7:ebaf9e60 r6:84a1a480 r5:855f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84180b80 INFO: task kworker/0:484:5465 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000013 r6:ebb05d8c r5:855f6c00 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854a9f8c r4:854a9c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a9f8c r4:84846680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84846680 r8:80287e08 r7:ebb01e60 r6:84a1a500 r5:855f6c00 r4:84180c80 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:854aa38c r4:854aa000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aa38c r4:84846700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f1800 r8:8484672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846700 r8:80287e08 r7:ebb01e60 r6:84a1a580 r5:855f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545000 INFO: task kworker/0:486:5469 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bdec7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:5470 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb11d84 r8:00000002 r7:60000113 r6:ebb11d8c r5:855eec00 r4:855eec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545080 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854aa78c r4:854aa400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aa78c r4:84846780 r4:84846780 r4:00000001 Exception stack(0xebb11fb0 to 0xebb11ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: be327000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:5472 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb19d84 r8:00000002 r7:60000013 r6:ebb19d8c r5:855f8c00 r4:855f8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a938c r4:854a9000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a938c r4:84846800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f8c00 r8:8484682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846800 r8:80287e08 r7:ebb0de60 r6:84a1a680 r5:855f8c00 r4:00000001 Exception stack(0xebb19fb0 to 0xebb19ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 1d20: be327000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r4:eb291dc0 r4:00000000 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:5474 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb21d84 r8:00000002 r7:60000013 r6:ebb21d8c r5:855f8000 r4:855f8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb771000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aab8c r4:854aa800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aab8c r4:84846880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f8000 r8:848468ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846880 r8:80287e08 r7:ebb0de60 r6:84a1a700 r5:855f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545340 INFO: task kworker/0:489:5474 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:8562d78c r4:8562d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562d78c r4:84846900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f9800 r8:8484692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846900 r8:80287e08 r7:ebb0de60 r6:84a1a780 r5:855f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545180 INFO: task kworker/0:490:5476 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: be327000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:5478 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb31d84 r8:00000002 r7:60000113 r6:ebb31d8c r5:855fa400 r4:855fa400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fa400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a5000 r5:854ab78c r4:854ab400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ab78c r4:84846a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:492:5480 blocked for more than 460 seconds. r5:855fb000 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545840 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abb8c r4:854ab800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854abb8c r4:84846b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fb000 r8:84846bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846b80 r8:80287e08 r7:ebb29e60 r6:84a1a880 r5:855fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855454c0 INFO: task kworker/0:492:5480 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bea25000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:5482 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000013 r6:ebb41d8c r5:855fbc00 r4:855fbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:855fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb819000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ab38c r4:854ab000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ab38c r4:84846a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855fbc00 r8:84846a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846a00 r8:80287e08 r7:ebb29e60 r6:84a1a900 r5:855fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545500 INFO: task kworker/0:493:5482 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bee7f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 task:kworker/0:494 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:855fd400 r4:855fd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855fd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eb82f000 r5:8562c38c r4:8562c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562c38c r4:84846980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: bf0e5000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:855fc800 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8562cb8c r4:8562c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84846b00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545ac0 INFO: task kworker/0:495:5487 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bf531000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ebb59d84 r8:00000002 r7:60000013 r6:ebb59d8c r5:855fe000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562d38c r4:8562d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562d38c r4:84846c00 r4:84846c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bf910000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8562df8c r4:8562dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562df8c r4:84846d00 r4:84846d00 Exception stack(0xebb61fb0 to 0xebb61ff8) r4:847449c0 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:85668c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 r5:00001000 r4:eb871000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562db8c r4:8562d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562db8c r4:84846c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85668c00 r8:84846cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846c80 r8:80287e08 r7:ebb61e60 r6:84a1ab80 r5:85668c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84180ec0 INFO: task kworker/0:498:5493 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bfce0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:5495 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85668000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85668000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 r5:8562e38c r4:8562e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562e38c r4:84846d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85668000 r8:84846dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846d80 r8:80287e08 r7:ebb61e60 r6:84a1ac00 r5:85668000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85545a00 INFO: task kworker/0:499:5495 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: bfce0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85669800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r9:83018005 r8:85669800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r5:8562ff8c r4:8562fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84846f80 Exception stack(0xebb79fb0 to 0xebb79ff8) r4:848135c0 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:5499 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb81d84 r8:00000002 r7:60000013 r6:ebb81d8c r5:8566bc00 r4:8566bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8566bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85615000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8566bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562e78c r4:8562e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562e78c r4:84846e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8566bc00 r8:84846e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84846e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84846e00 r8:80287e08 r7:ebb79e60 r6:84a1ad00 r5:8566bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb81fb0 to 0xebb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85615100 INFO: task kworker/0:501:5499 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c0381000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:5501 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb89d84 r8:00000002 r7:60000113 r6:ebb89d8c r5:8566c800 r4:8566c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8566c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85615240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8566c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562eb8c r4:8562e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562eb8c r4:852b8f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8566c800 r8:852b8fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b8f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8f80 r8:80287e08 r7:ebb79e60 r6:84a1ad80 r5:8566c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856150c0 INFO: task kworker/0:502:5501 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c0730000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb91e08 r9:83018005 r8:8566b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8562ef8c r4:8562ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562ef8c r4:8561b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8566b000 r8:8561b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b000 r8:80287e08 r7:ebb79e60 r6:84a1ae00 r5:8566b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb91fb0 to 0xebb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85615100 INFO: task kworker/0:503:5503 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c0730000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:5505 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb99d84 r8:00000002 r7:60000013 r6:ebb99d8c r5:8566d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r9:83018005 r8:8566d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 r5:8562f38c r4:8562f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562f38c r4:8561b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8561b080 r8:80287e08 r7:ebb79e60 r6:84a1ae80 r5:8566d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000013 r6:ebb95d8c r5:83b24800 r4:83b24800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b24800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856156c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb935000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562c78c r4:8562c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562c78c r4:8561b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b24800 r8:8561b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b100 r8:80287e08 r7:ebb79e60 r6:8561b180 r5:83b24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85615500 INFO: task kworker/0:505:5509 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c0a19000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:5511 blocked for more than 460 seconds. task:kworker/1:682 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:8559978c r4:85599400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559978c r4:85624000 r10:00000000 r9:85624000 r8:80287e08 r7:ebaade60 r6:8561b200 r5:83b26000 r4:856232c0 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:5513 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:83b25400 r4:83b25400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b25400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b25400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb967000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c038c r4:855c0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c038c r4:85624080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b25400 r8:856240ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624080 r8:80287e08 r7:ebaade60 r6:8561b280 r5:83b25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: c120e000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:684:5514 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:684 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb1d84 r8:00000002 r7:60000013 r6:ebbb1d8c r5:83b26c00 r4:83b26c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b26c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856239c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c138c r4:855c1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c138c r4:85624100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b26c00 r8:8562412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624100 r8:80287e08 r7:ebba9e60 r6:8561b300 r5:83b26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856232c0 INFO: task kworker/1:684:5514 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: c120e000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85615f40 r5:8562f78c r4:8562f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8561b380 r8:80287e08 r7:ebb79e60 r6:8561b400 r5:83b23000 r4:85615300 INFO: task kworker/0:506:5515 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c171f000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:5516 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb9d84 r8:00000002 r7:60000113 r6:ebbb9d8c r5:83b22400 r4:83b22400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b22400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856233c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b22400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c0b8c r4:855c0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c0b8c r4:85624180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b22400 r8:856241ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624180 r10:00000000 r9:85624180 r8:80287e08 r7:ebbb1e60 r6:8561b480 r5:83b22400 r4:85623600 Call trace: 1d20: c171f000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 task:kworker/1:686 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855c0f8c r4:855c0c00 r7:ddde2d80 r6:83018200 r5:855c0f8c r4:85624200 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85623600 INFO: task kworker/1:686:5518 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c19e9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:5524 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:83b23c00 r4:83b23c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b23c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854aaf8c r4:854aac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aaf8c r4:8561b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 task:kworker/0:508 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8a40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b20000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba73000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565038c r4:85650000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565038c r4:8561b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b20000 r8:8561b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8561b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561b600 r8:80287e08 r7:ebbbde60 r6:8561b680 r5:83b20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85615dc0 INFO: task kworker/0:508:5525 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c22d4000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb215000 r5:8562fb8c r4:8562f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561b700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c2767000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:847f0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc9e08 r5:00001000 r4:eb47f000 r5:855c1b8c r4:855c1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c1b8c r4:85624300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f0000 r8:8562432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624300 r8:80287e08 r7:dfad5e60 r6:8561b800 r5:847f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85623800 INFO: task kworker/1:687:5528 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c2767000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:5530 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:847f0c00 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854a2f8c r4:854a2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8561b880 Exception stack(0xebbc1fb0 to 0xebbc1ff8) r4:8561a080 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:688:5533 blocked for more than 460 seconds. r5:847f1800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c1f8c r4:855c1c00 r7:ddde2d80 r6:83018200 r5:855c1f8c r4:85624380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f1800 r8:856243ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624380 r8:80287e08 r7:ebbc9e60 r6:8561b980 r5:847f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd1fb0 to 0xebbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85623dc0 INFO: task kworker/1:688:5533 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c2b54000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5535 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd5d84 r8:00000002 r7:60000013 r6:ebbd5d8c r5:847f2400 r4:847f2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:847f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c238c r4:855c2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c238c r4:85624400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85624400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: c2b54000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:855c2b8c r4:855c2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847f3000 r8:856244ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85623dc0 INFO: task kworker/1:690:5537 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c3292000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:691:5539 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:691 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:847f3c00 r4:847f3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855c2f8c r4:855c2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c2f8c r4:85624500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f3c00 r8:8562452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:847f5400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:847f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:855c3b8c r4:855c3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85624580 r8:80287e08 r7:ebbdde60 r6:8561bb80 r5:847f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85623740 INFO: task kworker/1:692:5541 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c379c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:5542 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:847f6000 r4:8291a680 r4:00000000 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855c378c r4:855c3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c378c r4:85624600 r4:85624600 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbf5d84 r8:00000002 r7:60000113 r6:ebbf5d8c r5:84930000 r4:84930000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84930000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84930000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c078c r4:855c0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c078c r4:85624680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84930000 r8:856246ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624680 r8:80287e08 r7:ebbe5e60 r6:8561bc80 r5:84930000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf5fb0 to 0xebbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856191c0 INFO: task kworker/1:694:5545 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c41da000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ebbfdd84 r8:00000002 r7:60000013 r6:ebbfdd8c r5:84931800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856194c0 r5:855c278c r4:855c2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84931800 r8:856247ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84930c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84930c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84930c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c338c r4:855c3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c338c r4:85624700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84930c00 r8:8562472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624700 r8:80287e08 r7:ebbfde60 r6:8561bd80 r5:84930c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856191c0 INFO: task kworker/1:696:5550 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c47ef000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:84933c00 r5:84933c00 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856195c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84933c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7df000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847edf8c r4:847edc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847edf8c r4:85624800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84933c00 r8:8562482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624800 r8:80287e08 r7:ebc09e60 r6:8561be00 r5:84933c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619600 INFO: task kworker/1:697:5551 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c47ef000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:5552 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbcdd84 r8:00000002 r7:60000013 r6:ebbcdd8c r5:8566a400 r4:8566a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8566a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856198c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8566a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443df8c r4:8443dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443df8c r4:85624880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8566a400 r8:856248ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624880 r8:80287e08 r7:ebc09e60 r6:85624900 r5:8566a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619780 INFO: task kworker/1:698:5552 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c4f14000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:699:5555 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:699 state:D stack:0 pid:5555 tgid:5555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc05d84 r8:00000002 r7:60000113 r6:ebc05d8c r5:8566ec00 r4:8566ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8566ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8566ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb909000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0b8c r4:856a0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a0b8c r4:85624980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8566ec00 r8:856249ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624980 r8:80287e08 r7:ebc09e60 r6:85624a00 r5:8566ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856199c0 INFO: task kworker/1:699:5555 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c4f14000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:5556 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:855f5400 r4:855f5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:855f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a038c r4:856a0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a038c r4:85624a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f5400 r8:85624aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624a80 r8:80287e08 r7:ebc05e60 r6:85624b00 r5:855f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe1fb0 to 0xebbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619a00 INFO: task kworker/1:700:5556 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c55b6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856a138c r4:856a1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a138c r4:85624b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5561 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc1dd84 r8:00000002 r7:60000113 r6:ebc1dd8c r5:85670c00 r4:85670c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85670c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85619dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85670c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb997000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a078c r4:856a0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a078c r4:85624c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85670c00 r8:85624cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624c80 r8:80287e08 r7:ebc15e60 r6:85624d00 r5:85670c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc1dfb0 to 0xebc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619dc0 INFO: task kworker/1:702:5561 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeb291d28 to 0xeb291d70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ebc19d84 r8:00000002 r7:60000013 r6:ebc19d8c r5:85671800 r4:00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85671800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a178c r4:856a1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a178c r4:85624d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85671800 r8:85624dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85624d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85624d80 r8:80287e08 r7:ebc1de60 r6:85624e00 r5:85671800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc19fb0 to 0xebc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619fc0 INFO: task kworker/1:703:5562 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c59ac000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:5565 blocked for more than 460 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:5565 tgid:5565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc21d84 r8:00000002 r7:60000013 r6:ebc21d8c r5:85672400 r4:85672400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85672400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85672400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a1f8c r4:856a1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a1f8c r4:85624e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85624e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85673000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r9:83018205 r8:85673000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:856a1b8c r4:856a1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a1b8c r4:84a1af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85673000 r8:84a1af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a1af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a1af00 r8:80287e08 r7:ebc21e60 r6:84a1af80 r5:85673000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600280 INFO: task kworker/1:705:5566 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c628e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:706:5569 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:706 state:D stack:0 pid:5569 tgid:5569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc29d84 r8:00000002 r7:60000113 r6:ebc29d8c r5:85673c00 r4:85673c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85673c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc29e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85673c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba05000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a278c r4:856a2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a278c r4:85547000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85673c00 r8:8554702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547000 r8:80287e08 r7:ebc21e60 r6:85547080 r5:85673c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600280 INFO: task kworker/1:706:5569 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c6ada000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5570 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85674800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:856a2b8c r4:856a2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85547100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600040 INFO: task kworker/1:707:5570 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c6ada000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:5573 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856a2f8c r4:856a2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a2f8c r4:85547200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85547200 r8:80287e08 r7:ebc31e60 r6:85547280 r5:85675400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:85676000 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600840 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85676000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba45000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0f8c r4:856a0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a0f8c r4:85547300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85676000 r8:8554732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547300 r8:80287e08 r7:ebc35e60 r6:85547380 r5:85676000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856007c0 INFO: task kworker/1:709:5574 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c71ef000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85676c00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856a3b8c r4:856a3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a3b8c r4:85547400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85547400 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600380 INFO: task kworker/1:710:5576 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c773d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5579 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc41d84 r8:00000002 r7:60000113 r6:ebc41d8c r5:85678000 r4:85678000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85678000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85678000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a378c r4:856a3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a378c r4:85547500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85678000 r8:8554752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547500 r8:80287e08 r7:ebc3de60 r6:85547580 r5:85678000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc41fb0 to 0xebc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600b80 INFO: task kworker/1:711:5579 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:712:5582 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r5:85678c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3f8c r4:856a3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a3f8c r4:85547600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85678c00 r8:8554762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547600 r8:80287e08 r7:ebc3de60 r6:85547680 r5:85678c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600c80 INFO: task kworker/1:712:5582 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c7917000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5584 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:85679800 r4:85679800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85679800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8559b38c r4:8559b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:eb291dc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:5586 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:5586 tgid:5586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:84934800 r4:84934800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84934800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483c080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84934800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c3f8c r4:855c3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c3f8c r4:85547800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84934800 r8:8554782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547800 r8:80287e08 r7:ebc4de60 r6:8561be80 r5:84934800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600a80 INFO: task kworker/1:714:5586 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c8309000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:715:5588 blocked for more than 461 seconds. r4:84933000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856ae78c r4:856ae400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ae78c r4:85547880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85547880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 task:kworker/1:716 state:D stack:0 pid:5589 tgid:5589 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r5:00001000 r4:eac11000 r5:856a238c r4:856a2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a238c r4:85547900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:8554792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547900 r8:80287e08 r7:ebc61e60 r6:8561bf80 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc65fb0 to 0xebc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483c040 INFO: task kworker/1:716:5589 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c8309000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84936c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 r5:856ac78c r4:856ac400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ac78c r4:85547980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856acb8c r4:856ac800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85547a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547a00 r8:80287e08 r7:ebc61e60 r6:84846f00 r5:84936000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483c040 INFO: task kworker/1:718:5593 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c8abe000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:5596 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc81d84 r8:00000002 r7:60000013 r6:ebc81d8c r5:84932400 r4:84932400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84932400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc81e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856ad38c r4:856ad000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ad38c r4:85547a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84932400 r8:85547aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85547a80 r8:80287e08 r7:ebc61e60 r6:852be000 r5:84932400 1fa0: 00000000 00000000 00000000 00000000 r4:8483c040 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856ad78c r4:856ad400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ad78c r4:85547b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50000 r8:85547b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547b00 r8:80287e08 r7:ebc61e60 r6:852be080 r5:84b50000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483c5c0 INFO: task kworker/1:720:5597 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c8d76000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84b51800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483c940 r5:856adb8c r4:856ad800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856adb8c r4:85547b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b51800 r8:85547bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547b80 r8:80287e08 r7:ebc61e60 r6:852be100 r5:84b51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc8dfb0 to 0xebc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483c040 INFO: task kworker/1:721:5599 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c93b7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ebc95d84 r8:00000002 r7:60000013 r6:ebc95d8c r5:84b50c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483c780 r5:856ac38c r4:856ac000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ac38c r4:85547c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50c00 r8:85547c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547c00 r8:80287e08 r7:ebc61e60 r6:852be180 r5:84b50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc95fb0 to 0xebc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483c5c0 INFO: task kworker/1:722:5601 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c93b7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:5603 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r9:83018205 r8:84b53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:856ae38c r4:856ae000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ae38c r4:85547c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:5605 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebca5d84 r8:00000002 r7:60000013 r6:ebca5d8c r5:84b54800 r4:84b54800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b54800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483cc40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856acf8c r4:856acc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856acf8c r4:85547d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b54800 r8:85547d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547d00 r8:80287e08 r7:ebc61e60 r6:852be280 r5:84b54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca5fb0 to 0xebca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8483cac0 INFO: task kworker/1:724:5605 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c9866000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84b53000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600b40 r5:856aef8c r4:856aec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aef8c r4:85547d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b53000 r8:85547dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547d80 r8:80287e08 r7:ebc61e60 r6:852be300 r5:84b53000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483cec0 INFO: task kworker/1:725:5607 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84b55400 r4:8291a680 r4:00000000 r4:00000000 r5:856aeb8c r4:856ae800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856aeb8c r4:85547e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:5612 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcb1d84 r8:00000002 r7:60000113 r6:ebcb1d8c r5:84b56000 r4:84b56000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b56000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84b56000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856adf8c r4:856adc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856adf8c r4:85547e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b56000 r8:85547eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547e80 r8:80287e08 r7:ebca9e60 r6:852be400 r5:84b56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb1fb0 to 0xebcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483cf80 INFO: task kworker/1:727:5612 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: c9f35000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:84b56c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856af78c r4:856af400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85619f40 INFO: task kworker/1:728:5613 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ca273000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:729 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856afb8c r4:856af800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856afb8c r4:85547f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856aff8c r4:856afc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852cc000 r8:80287e08 r7:ebcb1e60 r6:852be580 r5:847f6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3240 INFO: task kworker/1:730:5618 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ca71c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5620 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000013 r6:ebcc1d8c r5:847f4800 r4:847f4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856af38c r4:856af000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856af38c r4:852cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f4800 r8:852cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84978000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84978000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d36c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b038c r4:856b0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b038c r4:852cc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978000 r8:852cc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc100 r8:80287e08 r7:ebcc1e60 r6:852be680 r5:84978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc5fb0 to 0xebcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3400 INFO: task kworker/1:732:5622 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cab4c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Exception stack(0xeb291fb0 to 0xeb291ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8af000 r5:856b0b8c r4:856b0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84979800 r8:852cc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc180 r8:80287e08 r7:ebcc5e60 r6:852be700 r5:84979800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebccdfb0 to 0xebccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3600 INFO: task kworker/1:733:5624 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cb287000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:5626 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebcd5d84 r8:00000002 r7:60000113 r6:ebcd5d8c r5:8497b000 r4:8497b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3a40 r5:856b138c r4:856b1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b138c r4:852cc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497b000 r8:852cc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd5fb0 to 0xebcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3780 INFO: task kworker/1:734:5626 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cb287000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:8497bc00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856b1f8c r4:856b1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b1f8c r4:852cc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:852cc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:852cc280 r8:80287e08 r7:ebcd5e60 r6:852be800 r5:8497bc00 INFO: task kworker/1:735:5628 is blocked on a mutex likely owned by task kworker/1:480:4781. 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:736:5630 blocked for more than 461 seconds. task:kworker/1:736 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebce5d84 r8:00000002 r7:60000113 r6:ebce5d8c r5:8497a400 r4:8497a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8497a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b178c r4:856b1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b178c r4:852cc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497a400 r8:852cc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc300 r8:80287e08 r7:ebcdde60 r6:852be880 r5:8497a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3540 INFO: task kworker/1:736:5630 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cb6ea000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:5632 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd19d84 r8:00000002 r7:60000113 r6:ebd19d8c r5:84978c00 r4:84978c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84978c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd19e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b0f8c r4:856b0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b0f8c r4:852cc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978c00 r8:852cc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc380 r8:80287e08 r7:ebcdde60 r6:852be900 r5:84978c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd19fb0 to 0xebd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3c80 INFO: task kworker/1:737:5632 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cbd3a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8497c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd25e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856b238c r4:856b2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8497c800 r8:852cc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cbd3a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:5636 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd2dd84 r8:00000002 r7:60000113 r6:ebd2dd8c r5:8497e000 r4:8497e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600b80 r4:00000000 r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:856b2b8c r4:856b2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b2b8c r4:852cc480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:852cc480 r8:80287e08 r7:ebd25e60 r6:852bea00 r5:8497e000 INFO: task kworker/1:739:5636 is blocked on a mutex likely owned by task kworker/1:480:4781. 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:5638 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd35d84 r8:00000002 r7:60000113 r6:ebd35d8c r5:85578000 r4:85578000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85578000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85578000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb969000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b278c r4:856b2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b278c r4:852cc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85578000 r8:852cc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc500 r8:80287e08 r7:ebd2de60 r6:852bea80 r5:85578000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd35fb0 to 0xebd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a0f380 INFO: task kworker/1:740:5638 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cc1a9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:5640 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd3dd84 r8:00000002 r7:60000013 r6:ebd3dd8c r5:85579800 r4:85579800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85579800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd3de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362380 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b1b8c r4:856b1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852cc580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8557b000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b2f8c r4:856b2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b2f8c r4:852cc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557b000 r8:852cc62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc600 r8:80287e08 r7:ebd3de60 r6:852beb80 r5:8557b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd4dfb0 to 0xebd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362100 INFO: task kworker/1:742:5642 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cc8ee000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8567b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b338c r4:856b3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b338c r4:852cc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567b000 r8:852cc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc680 r8:80287e08 r7:ebd3de60 r6:852cc700 r5:8567b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc9dfb0 to 0xebc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853620c0 INFO: task kworker/1:743:5643 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cccd8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:744:5645 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r4:8567bc00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b3b8c r4:856b3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b3b8c r4:852cc780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567bc00 r8:852cc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc780 r8:80287e08 r7:ebd3de60 r6:852cc800 r5:8567bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd49fb0 to 0xebd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362480 INFO: task kworker/1:744:5645 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cd168000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5648 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd51d84 r8:00000002 r7:60000013 r6:ebd51d8c r5:8567c800 r4:8567c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853627c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8567c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b3f8c r4:856b3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b3f8c r4:852cc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567c800 r8:852cc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc880 r8:80287e08 r7:ebd49e60 r6:852cc900 r5:8567c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd51fb0 to 0xebd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362440 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ebd55d84 r8:00000002 r7:60000013 r6:ebd55d8c r5:8567d400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b438c r4:856b4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567d400 r8:852cc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cc980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc980 r8:80287e08 r7:ebd51e60 r6:852cca00 r5:8567d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd55fb0 to 0xebd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362780 INFO: task kworker/1:746:5650 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cd335000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:5651 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a338c r4:856a3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a338c r4:852cca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567e000 r8:852ccaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cca80 r10:00000000 r9:852cca80 r8:80287e08 r7:ebd55e60 r6:852ccb00 r5:8567e000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8567ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b4b8c r4:856b4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b4b8c r4:852ccb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567ec00 r8:852ccbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ccb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ccb80 r8:80287e08 r7:ebd55e60 r6:852ccc00 r5:8567ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd61fb0 to 0xebd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362a40 INFO: task kworker/1:748:5654 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cdaba000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5656 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08 r5:00001000 r4:ebb35000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b538c r4:856b5000 r10:61c88647 r9:8567a400 r8:852cccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ebb43000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b578c r4:856b5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b578c r4:852ccd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680000 r8:852ccdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852ccd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ccd80 r8:80287e08 r7:ebd65e60 r6:852cce00 r5:85680000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd6dfb0 to 0xebd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85362d00 INFO: task kworker/1:750:5659 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ce4bd000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5660 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd5dd84 r8:00000002 r7:60000013 r6:ebd5dd8c r5:85680c00 r4:85680c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd5de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85680c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b4f8c r4:856b4c00 r10:61c88647 r9:85680c00 r8:852cceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5662 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd75d84 r8:00000002 r7:60000013 r6:ebd75d8c r5:85682400 r4:85682400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85682400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a140 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b5f8c r4:856b5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b5f8c r4:85544000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85682400 r8:8554402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544000 r8:80287e08 r7:ebd5de60 r6:85544080 r5:85682400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd75fb0 to 0xebd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d3540 INFO: task kworker/1:752:5662 is blocked on a mutex likely owned by task kworker/1:480:4781. Workqueue: events bpf_prog_free_deferred 1d20: cea83000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xebd79fb0 to 0xebd79ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5666 blocked for more than 461 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd71d84 r8:00000002 r7:60000013 r6:ebd71d8c r5:85683000 r4:85683000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd71e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a7c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85683000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b5b8c r4:856b5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b5b8c r4:85544200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683000 r8:8554422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544200 r8:80287e08 r7:ebd79e60 r6:85544280 r5:85683000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd71fb0 to 0xebd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562a240 INFO: task kworker/1:754:5666 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cefdb000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:755:5668 blocked for more than 462 seconds. r4:85685400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd81e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5670 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd85d84 r8:00000002 r7:60000113 r6:ebd85d8c r5:85686000 r4:85686000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd85e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a9c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b6b8c r4:856b6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b6b8c r4:85544400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686000 r8:8554442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544400 r8:80287e08 r7:ebd71e60 r6:85544480 r5:85686000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd85fb0 to 0xebd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562a540 INFO: task kworker/1:756:5670 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cf6a8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5673 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd7dd84 r8:00000002 r7:60000013 r6:ebd7dd8c r5:85684800 r4:85684800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85684800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd7de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ad40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b778c r4:856b7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b778c r4:85544500 r10:61c88647 r9:85684800 r8:8554452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd7dfb0 to 0xebd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562a680 INFO: task kworker/1:757:5673 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cfa12000 eafa9000 00000001 80239b98 7f439000 00000001 r5:80000113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:758:5674 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:85686c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaba3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b738c r4:856b7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b738c r4:85544600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686c00 r8:8554462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544600 r8:80287e08 r7:ebd7de60 r6:85544680 r5:85686c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbedfb0 to 0xebbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562a880 INFO: task kworker/1:758:5674 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: cfa12000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5676 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd89d84 r8:00000002 r7:60000113 r6:ebd89d8c r5:85683c00 r4:85683c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 r4:00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b7f8c r4:856b7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b7f8c r4:85544700 r10:61c88647 r9:85683c00 r8:8554472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebd89fb0 to 0xebd89ff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b6f8c r4:856b6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b6f8c r4:85544880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557a400 r8:855448ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544880 r8:80287e08 r7:ebd89e60 r6:852bec00 r5:8557a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd95fb0 to 0xebd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562aec0 INFO: task kworker/1:760:5677 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d01a9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5680 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb625000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b378c r4:856b3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5681 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebda5d84 r8:00000002 r7:60000013 r6:ebda5d8c r5:8557d400 r4:8557d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8557d400 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b7b8c r4:856b7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8557d400 r8:8554492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:763:5683 blocked for more than 462 seconds. r10:8291a684 r9:ebdadd84 r8:00000002 r7:60000013 r6:ebdadd8c r5:8557bc00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c478c r4:856c4400 r7:ddde2d80 r6:83018200 r5:856c478c r4:85544980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5686 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdb1d84 r8:00000002 r7:60000013 r6:ebdb1d8c r5:8557ec00 r4:8557ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8557ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e2380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb655000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b478c r4:856b4400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b478c r4:85544a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557ec00 r8:85544a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544a00 r8:80287e08 r7:ebdade60 r6:852bee00 r5:8557ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdb1fb0 to 0xebdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c4f8c r4:856c4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c4f8c r4:85544a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497ec00 r8:85544aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544a80 r8:80287e08 r7:ebdade60 r6:852bee80 r5:8497ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdbdfb0 to 0xebdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e2500 INFO: task kworker/1:765:5689 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d1153000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5690 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdc1d84 r8:00000002 r7:60000113 r6:ebdc1d8c r5:8497d400 r4:8497d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e28c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c538c r4:856c5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c538c r4:85544b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497d400 r8:85544b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544b00 r8:80287e08 r7:ebdbde60 r6:852bef00 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdc1fb0 to 0xebdc1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:856e2440 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdd1d84 r8:00000002 r7:60000113 r6:ebdd1d8c r5:8571a400 r4:8571a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e29c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8571a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ed000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c578c r4:856c5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c578c r4:85544b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571a400 r8:85544bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544b80 r8:80287e08 r7:ebdc1e60 r6:852bef80 r5:8571a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd1fb0 to 0xebdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e26c0 INFO: task kworker/1:767:5694 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d1b19000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85718000 r8:85544c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5697 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdddd84 r8:00000002 r7:60000113 r6:ebdddd8c r5:85718c00 r4:85718c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85718c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebddde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e2d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85718c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb907000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c638c r4:856c6000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c638c r4:85544c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85718c00 r8:85544cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544c80 r8:80287e08 r7:ebdd5e60 r6:856f6080 r5:85718c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdddfb0 to 0xebdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e2a40 INFO: task kworker/1:769:5697 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d20: d1fa7000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5698 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5698 tgid:5698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c4b8c r4:856c4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c4b8c r4:85544d00 r10:61c88647 r9:8571bc00 r8:85544d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d25fe000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8571b000 r8:85544dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85544d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544d80 r8:80287e08 r7:ebde1e60 r6:856f6180 r5:8571b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebde9fb0 to 0xebde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e2980 INFO: task kworker/1:771:5700 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d25fe000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5702 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdf1d84 r8:00000002 r7:60000113 r6:ebdf1d8c r5:8571d400 r4:8571d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf1e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c678c r4:856c6400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c678c r4:85544e00 r10:61c88647 r9:8571d400 r8:85544e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d2b90000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5703 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdf5d84 r8:00000002 r7:60000113 r6:ebdf5d8c r5:8571c800 r4:8571c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c6b8c r4:856c6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c6b8c r4:85544e80 r10:61c88647 r9:8571c800 r8:85544eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r5:85719800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c7b8c r4:856c7800 r10:61c88647 r9:85719800 r8:852ccfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d2b90000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5708 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:775 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd91d84 r8:00000002 r7:60000013 r6:ebd91d8c r5:8571e000 r4:8571e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd91e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8571e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c738c r4:856c7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c738c r4:85547f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571e000 r8:85547fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85547f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85547f80 r8:80287e08 r7:ec609e60 r6:856f6380 r5:8571e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd91fb0 to 0xebd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9140 INFO: task kworker/1:775:5708 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d2b90000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/1:776 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85688000 r8:85544f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d2f84000 eafa9000 00000001 80239b98 7f439000 00000001 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:5713 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:5713 tgid:5713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec621d84 r8:00000002 r7:60000013 r6:ec621d8c r5:85689800 r4:85689800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85689800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec621e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fe900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85689800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ed38c r4:847ed000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ed38c r4:856f6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85689800 r8:856f642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f6400 r8:80287e08 r7:eba01e60 r6:856f7000 r5:85689800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e8d40 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8568b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba95000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650b8c r4:85650800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650b8c r4:856f6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568b000 r8:856f64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f6480 r8:80287e08 r7:ec621e60 r6:856f7080 r5:8568b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e8fc0 INFO: task kworker/0:512:5715 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d3a3b000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:5717 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:5717 tgid:5717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:8568a400 r4:8568a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8568a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650f8c r4:85650c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650f8c r4:856f6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568a400 r8:856f652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f6500 r8:80287e08 r7:ec621e60 r6:856f7100 r5:8568a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d3e96000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec631fb0 to 0xec631ff8) Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:5720 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec605d84 r8:00000002 r7:60000113 r6:ec605d8c r5:8571ec00 r4:8571ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ae80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8571ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565178c r4:85651400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565178c r4:856f6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571ec00 r8:856f65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f6580 r8:80287e08 r7:ec621e60 r6:856f6600 r5:8571ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec605fb0 to 0xec605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8562af40 INFO: task kworker/0:514:5720 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d4454000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c878c r4:856c8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9940 INFO: task kworker/1:778:5723 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d4454000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5725 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84771800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9940 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c5b8c r4:856c5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c5b8c r4:856f7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:eb291dc0 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c938c r4:856c9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: d49f4000 eafa9000 00000001 80239b98 7f439000 00000001 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5728 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec651d84 r8:00000002 r7:60000013 r6:ec651d8c r5:84770c00 r4:84770c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84770c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9c00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c8b8c r4:856c8800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c8b8c r4:856f7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84770c00 r8:856f742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7400 r8:80287e08 r7:ec64de60 r6:856f6800 r5:84770c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:84772400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c9b8c r4:856c9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c9b8c r4:856f7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84772400 r8:856f74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7480 r8:80287e08 r7:ec64de60 r6:856f6880 r5:84772400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9d80 INFO: task kworker/1:782:5730 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d52ab000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5732 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84775400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856c838c r4:856c8000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c838c r4:856f7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:856f7500 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5735 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec679d84 r8:00000002 r7:60000013 r6:ec679d8c r5:84774800 r4:84774800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84774800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec679e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84774800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec671000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c9f8c r4:856c9c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c9f8c r4:856f7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84774800 r8:856f75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7580 r8:80287e08 r7:ec659e60 r6:856f6980 r5:84774800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701080 INFO: task kworker/1:784:5735 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d58c9000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84776c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 r5:856ca38c r4:856ca000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84776c00 r8:856f762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:786 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:8568bc00 r4:8568bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8568bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c8f8c r4:856c8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c8f8c r4:856f7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568bc00 r8:856f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7680 r8:80287e08 r7:ec685e60 r6:856f7700 r5:8568bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701340 INFO: task kworker/1:786:5738 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d6438000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:787:5742 blocked for more than 462 seconds. r4:8568e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ca78c r4:856ca400 r7:ddde2d80 r6:83018200 r5:856ca78c r4:856f7780 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8568ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857016c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8568ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cab8c r4:856ca800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cab8c r4:856f7880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568ec00 r8:856f78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7880 r8:80287e08 r7:ec681e60 r6:856f7900 r5:8568ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701680 INFO: task kworker/1:788:5743 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d6770000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701840 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8568d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856caf8c r4:856cac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856caf8c r4:856f7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568d400 r8:856f79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7980 r8:80287e08 r7:ec681e60 r6:856f7a00 r5:8568d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd99fb0 to 0xebd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701780 INFO: task kworker/1:789:5745 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d6ab0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85688c00 r5:85688c00 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:ec6c3000 r5:856cbb8c r4:856cb800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cbb8c r4:856f7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85688c00 r8:856f7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7a80 r8:80287e08 r7:ec681e60 r6:856f7b00 r5:85688c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d6ab0000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5750 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5750 tgid:5750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:85690000 r4:85690000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85690000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cb78c r4:856cb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cb78c r4:856f7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690000 r8:856f7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7b80 r8:80287e08 r7:ec6a5e60 r6:856f7c00 r5:85690000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701b00 INFO: task kworker/1:791:5750 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d73f8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5751 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6ddd84 r8:00000002 r7:60000113 r6:ec6ddd8c r5:84773c00 r4:84773c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84773c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6dde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85701e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cbf8c r4:856cbc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cbf8c r4:856f7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84773c00 r8:856f7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7c80 r8:80287e08 r7:ec6a5e60 r6:856f6a80 r5:84773c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6ddfb0 to 0xec6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85701c00 INFO: task kworker/1:792:5751 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d73f8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5755 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000113 r6:ec70dd8c r5:85728c00 r4:85728c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85728c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f91c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85728c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6eb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c7f8c r4:856c7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856c7f8c r4:856f7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85728c00 r8:856f7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7d00 r8:80287e08 r7:ec6dde60 r6:856f6b00 r5:85728c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717000 INFO: task kworker/1:793:5755 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d77c2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5756 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec711d84 r8:00000002 r7:60000113 r6:ec711d8c r5:85729800 r4:85729800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85729800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85729800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f1000 r5:856cc78c r4:856cc400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cc78c r4:856f7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85729800 r8:856f7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5758 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec725d84 r8:00000002 r7:60000113 r6:ec725d8c r5:8572b000 r4:8572b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8572b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857172c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8572b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec713000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ccf8c r4:856ccc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ccf8c r4:856f7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572b000 r8:856f7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7e00 r8:80287e08 r7:ec711e60 r6:856f6c00 r5:8572b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717000 INFO: task kworker/1:795:5758 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d7b49000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5759 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85728000 r4:85728000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85728000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85728000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec719000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cd38c r4:856cd000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cd38c r4:856f7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85728000 r8:856f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f7e80 r8:80287e08 r7:ec725e60 r6:856f6c80 r5:85728000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:eb291dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:8572c800 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8572c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r5:856cd78c r4:856cd400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856f7f00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d8270000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5763 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec751d84 r8:00000002 r7:60000113 r6:ec751d8c r5:8572d400 r4:8572d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8572d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec751e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717d40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8572d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ceb8c r4:856ce800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ceb8c r4:8575a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572d400 r8:8575a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a000 r8:80287e08 r7:ec745e60 r6:856f6d80 r5:8572d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec751fb0 to 0xec751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717740 INFO: task kworker/1:798:5763 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d8270000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5764 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000013 r6:ec755d8c r5:8572e000 r4:8572e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8572e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8572e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec757000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cc38c r4:856cc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cc38c r4:8575a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572e000 r8:8575a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a080 r8:80287e08 r7:ec751e60 r6:856f6e00 r5:8572e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857171c0 INFO: task kworker/1:799:5764 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d855c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5766 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:8572bc00 r4:8572bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8572bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8572bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cdb8c r4:856cd800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cdb8c r4:8575a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572bc00 r8:8575a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a180 r8:80287e08 r7:ec751e60 r6:856f6e80 r5:8572bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857178c0 INFO: task kworker/1:800:5766 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5768 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5768 tgid:5768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc79d84 r8:00000002 r7:60000013 r6:ebc79d8c r5:8572a400 r4:8572a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8572a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717a00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8572a400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e093b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ce38c r4:856ce000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ce38c r4:8575a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572a400 r8:8575a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a200 r8:80287e08 r7:ec751e60 r6:856f6f00 r5:8572a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717940 INFO: task kworker/1:801:5768 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d8f99000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 INFO: task kworker/1:802:5770 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:85691800 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717b40 r5:856ce78c r4:856ce400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5772 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:85692400 r4:85692400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85692400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857178c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856cdf8c r4:856cdc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cdf8c r4:8575a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85692400 r8:8575a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a300 r8:80287e08 r7:ec751e60 r6:8575a380 r5:85692400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5776 blocked for more than 462 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec765d84 r8:00000002 r7:60000113 r6:ec765d8c r5:85693000 r4:85693000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85693000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717f40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85693000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cf38c r4:856cf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cf38c r4:8575a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85693000 r8:8575a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a400 r8:80287e08 r7:ec751e60 r6:8575a480 r5:85693000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec765fb0 to 0xec765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717cc0 INFO: task kworker/1:804:5776 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d8f99000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5777 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec775d84 r8:00000002 r7:60000113 r6:ec775d8c r5:8557e000 r4:8557e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8557e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85717e40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8557e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb535000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cf78c r4:856cf400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cf78c r4:8575a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557e000 r8:8575a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a500 r8:80287e08 r7:ec765e60 r6:856f6f80 r5:8557e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85717e00 INFO: task kworker/1:805:5777 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d958c000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r5:00001000 r4:eb593000 r5:856cfb8c r4:856cf800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cfb8c r4:8575a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8572ec00 r8:8575a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a580 r8:80287e08 r7:ec775e60 r6:8576f000 r5:8572ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec77dfb0 to 0xec77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fbd00 INFO: task kworker/1:806:5779 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d9b9a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:807:5781 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:807 state:D stack:0 pid:5781 tgid:5781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85730000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d4f8c r4:856d4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85730000 r8:8575a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 r4:85717ac0 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:808 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:85730c00 r4:85730c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85730c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85730c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cff8c r4:856cfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cff8c r4:8575a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85730c00 r8:8575a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a680 r8:80287e08 r7:ec785e60 r6:8576f100 r5:85730c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576c080 INFO: task kworker/1:808:5782 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: d9faa000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7a7000 r5:856c978c r4:856c9400 r7:ddde2d80 r6:83018200 r5:856c978c r4:8575a700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:810:5786 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:810 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec799d84 r8:00000002 r7:60000013 r6:ec799d8c r5:85731800 r4:85731800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85731800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec799e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c3c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85731800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb813000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cef8c r4:856cec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856cef8c r4:8575a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85731800 r8:8575a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a780 r8:80287e08 r7:ec785e60 r6:8576f200 r5:85731800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec799fb0 to 0xec799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576c300 INFO: task kworker/1:810:5786 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:853c5f8c r4:853c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85733000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cb38c r4:856cb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5790 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec76dd84 r8:00000002 r7:60000113 r6:ec76dd8c r5:85693c00 r4:85693c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85693c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85693c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d478c r4:856d4400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d478c r4:8575a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85693c00 r8:8575a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a880 r8:80287e08 r7:ec785e60 r6:8575a900 r5:85693c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576c540 INFO: task kworker/1:812:5790 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: daeb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85694800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d538c r4:856d5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d538c r4:8575a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85694800 r8:8575a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a980 r8:80287e08 r7:ec785e60 r6:8575aa00 r5:85694800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576c800 INFO: task kworker/1:813:5793 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: daeb3000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5795 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5795 tgid:5795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7add84 r8:00000002 r7:60000013 r6:ec7add8c r5:85695400 r4:85695400 r5:85695400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576cac0 r5:856d578c r4:856d5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d578c r4:8575aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85695400 r8:8575aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577b080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85696c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d5b8c r4:856d5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d5b8c r4:8575ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85696c00 r8:8575abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575ab80 r8:80287e08 r7:ec7ade60 r6:8575ac00 r5:85696c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576c8c0 INFO: task kworker/1:815:5796 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: db2e8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85690c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r9:83018205 r8:85690c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:856d438c r4:856d4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5800 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5800 tgid:5800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7bdd84 r8:00000002 r7:60000013 r6:ec7bdd8c r5:85699800 r4:85699800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85699800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577b340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85699800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebadd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d638c r4:856d6000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d638c r4:8575ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85699800 r8:8575adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575ad80 r8:80287e08 r7:ec6ade60 r6:8575ae00 r5:85699800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576cb80 INFO: task kworker/1:817:5800 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dbc38000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r5:00001000 r4:ebacb000 r5:8565078c r4:85650400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576ac00 INFO: task kworker/0:515:5803 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dbdcf000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5805 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856d6f8c r4:856d6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:8569a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577b540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8569a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb09000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d6b8c r4:856d6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d6b8c r4:85779100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569a400 r8:8577912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779100 r8:80287e08 r7:ec7c1e60 r6:85779180 r5:8569a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b5fb0 to 0xec7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577b500 INFO: task kworker/1:819:5809 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dc5e1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8569b000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856d678c r4:856d6400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8569b000 r8:8577902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8577b600 INFO: task kworker/1:820:5810 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dc5e1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8569bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:856d778c r4:856d7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d778c r4:85779200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:eb291dc0 r5:00001000 r4:eafbb000 r4:850f5d80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec805d84 r8:00000002 r7:60000113 r6:ec805d8c r5:8569c800 r4:8569c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577bcc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8569c800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d7f8c r4:856d7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d7f8c r4:85779300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569c800 r8:8577932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779300 r8:80287e08 r7:ec7c9e60 r6:85779380 r5:8569c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577b8c0 INFO: task kworker/1:822:5815 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:823:5816 blocked for more than 463 seconds. r5:8569d400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856d5f8c r4:856d5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d5f8c r4:85779400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85779400 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8569e000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856ccb8c r4:856cc800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8569e000 r8:8577952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dd232000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5820 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec80dd84 r8:00000002 r7:60000013 r6:ec80dd8c r5:8569ec00 r4:8569ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577be40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:856d4b8c r4:856d4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d4b8c r4:85779700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569ec00 r8:8577972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5823 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec811d84 r8:00000002 r7:60000013 r6:ec811d8c r5:85696000 r4:85696000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85696000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85696000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df879000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c038c r4:857c0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c038c r4:85779600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85696000 r8:8577962c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779600 r8:80287e08 r7:ec809e60 r6:85779680 r5:85696000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec811fb0 to 0xec811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577bf80 INFO: task kworker/1:826:5823 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ddc80000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Not tainted 6.15.0-rc5-syzkaller #0 r4:85608000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb5e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857c138c r4:857c1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c138c r4:85779800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608000 r8:8577982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779800 r8:80287e08 r7:ec811e60 r6:85779880 r5:85608000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdb5fb0 to 0xebdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b4080 INFO: task kworker/1:827:5825 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ddc80000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:828 state:D stack:0 pid:5826 tgid:5826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857c0b8c r4:857c0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85608c00 r8:8577992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8484cc40 task:kworker/1:829 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc5e08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b46c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85609800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c1b8c r4:857c1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c1b8c r4:85779a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85609800 r8:85779a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779a00 r8:80287e08 r7:ebdb5e60 r6:85779a80 r5:85609800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdc5fb0 to 0xebdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b42c0 INFO: task kworker/1:829:5829 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: de0a1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8484cc40 task:kworker/1:830 state:D stack:0 pid:5830 tgid:5830 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb46d000 r5:857c078c r4:857c0400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8560a400 r8:85779b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b4540 Workqueue: events bpf_prog_free_deferred 1d20: de322000 eafa9000 00000001 80239b98 7f439000 00000001 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5833 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5833 tgid:5833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdcdd84 r8:00000002 r7:60000013 r6:ebdcdd8c r5:8560b000 r4:8560b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7dd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c278c r4:857c2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c278c r4:85779c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560b000 r8:85779c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779c00 r8:80287e08 r7:ebdc5e60 r6:85779c80 r5:8560b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdcdfb0 to 0xebdcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:832:5836 blocked for more than 463 seconds. Call trace: r5:8560bc00 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c1f8c r4:857c1c00 r7:ddde2d80 r6:83018200 r5:857c1f8c r4:85779d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560bc00 r8:85779d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779d00 r8:80287e08 r7:ebdcde60 r6:85779d80 r5:8560bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf9fb0 to 0xebdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b47c0 INFO: task kworker/1:832:5836 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: de937000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:5837 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebde5d84 r8:00000002 r7:60000013 r6:ebde5d8c r5:8560c800 r5:8560c800 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857c238c r4:857c2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c238c r4:85779e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560c800 r8:85779e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85779e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85779e00 r8:80287e08 r7:ebdcde60 r6:85779e80 r5:8560c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebde5fb0 to 0xebde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b4080 INFO: task kworker/1:833:5837 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: dee5e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8560d400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c2b8c r4:857c2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c2b8c r4:85779f00 r10:61c88647 r9:8560d400 r8:85779f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b4b00 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5842 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5842 tgid:5842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec695d84 r8:00000002 r7:60000013 r6:ec695d8c r5:8560e000 r4:8560e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec695e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84372540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8560e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba55000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c3f8c r4:857c3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c3f8c r4:847a9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560e000 r8:847a902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9000 r8:80287e08 r7:ec65de60 r6:847a9080 r5:8560e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec695fb0 to 0xec695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b4c40 INFO: task kworker/1:835:5842 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:836:5843 blocked for more than 463 seconds. r4:8560ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r9:83018205 r8:8560ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:857c2f8c r4:857c2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c2f8c r4:847a9100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560ec00 r8:847a912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9100 r8:80287e08 r7:ec695e60 r6:847a9180 r5:8560ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b4d00 INFO: task kworker/1:836:5843 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: df8ae000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5844 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:857c378c r4:857c3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85790000 r8:847a922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5848 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5848 tgid:5848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000113 r6:ec665d8c r5:85791800 r4:85791800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85791800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84372000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85791800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c178c r4:857c1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c178c r4:847a9300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85791800 r8:847a932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9300 r8:80287e08 r7:ec695e60 r6:847a9380 r5:85791800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84372340 INFO: task kworker/1:838:5848 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d60: 80230ad0 80239bb0 80000113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5849 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5849 tgid:5849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:85792400 r4:85792400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85792400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84372200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85792400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba35000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c3b8c r4:857c3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c3b8c r4:847a9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85792400 r8:847a942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9400 r8:80287e08 r7:ec695e60 r6:847a9480 r5:85792400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/1:840:5851 blocked for more than 463 seconds. r4:85790c00 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d738c r4:856d7000 r7:ddde2d80 r6:83018200 r5:856d738c r4:847a9500 r10:00000000 r9:847a9500 r8:80287e08 r7:ec695e60 r6:847a9580 r5:85790c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e04c1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5852 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5852 tgid:5852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:85793c00 r4:85793c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85793c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c0f8c r4:857c0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c0f8c r4:847a9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85793c00 r8:847a96ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec75dfb0 to 0xec75dff8) r4:84372400 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebbab000 r5:857cc78c r4:857cc400 r7:ddde2d80 r6:83018200 r5:857cc78c r4:847a9600 r10:00000000 r9:847a9600 r8:80287e08 r7:ec75de60 r6:8576f400 r5:85736c00 r4:84372800 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80000113 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:5858 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:85735400 r4:85735400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85735400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843727c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85735400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb8d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d7b8c r4:856d7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d7b8c r4:847a9700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85735400 r8:847a972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9700 r8:80287e08 r7:ec821e60 r6:8576f480 r5:85735400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84372640 INFO: task kworker/1:843:5858 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e0dae000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 r4:85734800 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ccf8c r4:857ccc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ccf8c r4:847a9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85734800 r8:847a97ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9780 r8:80287e08 r7:ec821e60 r6:8576f500 r5:85734800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec831fb0 to 0xec831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843721c0 INFO: task kworker/1:844:5859 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e12c1000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:857cd38c r4:857cd000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85736000 r8:847a982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84372c40 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8484cc40 task:kworker/1:846 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84372c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85793000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc71000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ccb8c r4:857cc800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ccb8c r4:847a9880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85793000 r8:847a98ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9880 r8:80287e08 r7:ec839e60 r6:847a9900 r5:85793000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84372d40 INFO: task kworker/1:846:5863 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e1472000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85795400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857cdb8c r4:857cd800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85795400 r8:847a99ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5868 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5868 tgid:5868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec841d84 r8:00000002 r7:60000013 r6:ec841d8c r5:85796c00 r4:85796c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85796c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cdf8c r4:857cdc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cdf8c r4:847a9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85796c00 r8:847a9aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9a80 r8:80287e08 r7:ec819e60 r6:847a9b00 r5:85796c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85614140 INFO: task kworker/1:848:5868 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e1bee000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85798000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857ce38c r4:857ce000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85798000 r8:847a9bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5872 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec84dd84 r8:00000002 r7:60000113 r6:ec84dd8c r5:85799800 r4:85799800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85799800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85799800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cd78c r4:857cd400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cd78c r4:847a9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85799800 r8:847a9cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9c80 r8:80287e08 r7:ec849e60 r6:847a9d00 r5:85799800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84776000 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652b8c r4:85652800 r10:61c88647 r9:84776000 r8:8576f62c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5875 blocked for more than 463 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5875 tgid:5875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85578c00 r4:85578c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85578c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856147c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85578c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd13000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ce78c r4:857ce400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ce78c r4:847a9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85578c00 r8:847a9dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9d80 r8:80287e08 r7:ec849e60 r6:8576f700 r5:85578c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec851fb0 to 0xec851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85614240 INFO: task kworker/1:851:5875 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e245d000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r5:84a60000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:84a60000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd21000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cef8c r4:857cec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cef8c r4:847a9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a60000 r8:847a9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9e00 r8:80287e08 r7:ec851e60 r6:8576f780 r5:84a60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85614280 INFO: task kworker/1:852:5877 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e245d000 eafa9000 00000001 80239b98 7f439000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5880 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84a62400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r9:83018205 r8:84a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:857cf38c r4:857cf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cf38c r4:847a9e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:85614980 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8484cc40 task:kworker/1:854 state:D stack:0 pid:5881 tgid:5881 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:857d438c r4:857d4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d438c r4:8575af80 r10:61c88647 r9:84a63000 r8:8575afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5883 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5883 tgid:5883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:84a60c00 r4:84a60c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a60c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd39000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cfb8c r4:857cf800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cfb8c r4:847a9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a60c00 r8:847a9f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f00 r8:80287e08 r7:ec869e60 r6:8576f900 r5:84a60c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85614880 INFO: task kworker/1:855:5883 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e2eee000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:856 state:D stack:0 pid:5885 tgid:5885 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r9:83018205 r8:84a61800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:857ceb8c r4:857ce800 r7:ddde2d80 r6:83018200 r5:857ceb8c r4:85610000 r10:00000000 r9:85610000 r8:80287e08 r7:ec869e60 r6:8576f980 r5:84a61800 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:853c5f8c r4:853c5c00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5887 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5887 tgid:5887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec845d84 r8:00000002 r7:60000113 r6:ec845d8c r5:85798c00 r4:85798c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85798c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85798c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd69000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cff8c r4:857cfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cff8c r4:85610080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85798c00 r8:856100ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610080 r8:80287e08 r7:ec869e60 r6:85610100 r5:85798c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561c000 INFO: task kworker/1:857:5887 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e34c5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857d538c r4:857d5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d538c r4:85610180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579b000 r8:856101ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610180 r8:80287e08 r7:ec869e60 r6:85610200 r5:8579b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561c380 INFO: task kworker/1:858:5889 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e38a6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:8579bc00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857d4b8c r4:857d4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4b8c r4:85610280 r10:61c88647 r9:8579bc00 r8:856102ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:860 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8579c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561c640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8579c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdfd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d578c r4:857d5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d578c r4:85610380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579c800 r8:856103ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610380 r8:80287e08 r7:ec875e60 r6:85610400 r5:8579c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561c4c0 INFO: task kworker/1:860:5894 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 r10:61c88647 r9:8579d400 r8:856104ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610480 r8:80287e08 r7:ec881e60 r6:85610500 r5:8579d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561c040 INFO: task kworker/1:861:5896 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e3c98000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Workqueue: events bpf_prog_free_deferred r4:8579e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8579e000 r8:856105ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:863:5900 blocked for more than 464 seconds. r10:8291a684 r9:ec895d84 r8:00000002 r7:60000013 r6:ec895d8c r5:8579a400 r4:00000000 r4:00000000 r5:00001000 r4:ec647000 r7:ddde2d80 r6:83018200 r5:857d638c r4:85610680 r10:61c88647 r9:8579a400 r8:856106ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610680 r8:80287e08 r7:ec88de60 r6:85610700 r5:8579a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561c980 INFO: task kworker/1:863:5900 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e454e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:864:5901 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:864 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec899d84 r8:00000002 r7:60000013 r6:ec899d8c r5:85794800 r4:85794800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85794800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561ccc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85794800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec655000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d5f8c r4:857d5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d5f8c r4:85610780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85794800 r8:856107ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610780 r8:80287e08 r7:ec895e60 r6:85610800 r5:85794800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec899fb0 to 0xec899ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec66d000 r10:61c88647 r9:8579ec00 r8:856108ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec89dfb0 to 0xec89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561cd40 INFO: task kworker/1:865:5903 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e454e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 task:kworker/1:866 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857a0c00 r8:856109ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec8a1fb0 to 0xec8a1ff8) r4:847ea540 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r10:61c88647 r9:857a2400 r8:85610aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:868:5909 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:868 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec891d84 r8:00000002 r7:60000013 r6:ec891d8c r5:857a0000 r4:857a0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ff3c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d778c r4:857d7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d778c r4:85610b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a0000 r8:85610bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85610b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610b80 r8:80287e08 r7:ec8a1e60 r6:85610c00 r5:857a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec891fb0 to 0xec891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ff180 INFO: task kworker/1:868:5909 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e4a97000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857a3000 r8:85610cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85610c80 r8:80287e08 r7:ec891e60 r6:85610d00 r5:857a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ff380 INFO: task kworker/1:869:5911 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e4dfd000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:857d7b8c r4:85610d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:857ff500 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r5:80000113 r4:80239bb0 r4:eb291dc0 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5917 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:84a66000 r4:84a66000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a66000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ff900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a66000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6fd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cf78c r4:857cf400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cf78c r4:847a9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a66000 r8:847a9fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847a9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f80 r8:80287e08 r7:ec8a9e60 r6:8576fa80 r5:84a66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ff840 INFO: task kworker/1:872:5917 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e564e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:873:5919 blocked for more than 464 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561cfc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ff980 INFO: task kworker/1:873:5919 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e5944000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8484cc40 task:kworker/1:874 state:D stack:0 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec8cdfb0 to 0xec8cdff8) task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r4:eb291dc0 r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85716080 r8:80287e08 r7:ec8c9e60 r6:8576fc00 r5:850a8000 r4:857ff0c0 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5924 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5924 tgid:5924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:850a8c00 r4:850a8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850a8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ffcc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dcb8c r4:857dc800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dcb8c r4:85716100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a8c00 r8:8571612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716100 r8:80287e08 r7:ec8c9e60 r6:8576fc80 r5:850a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ffd00 INFO: task kworker/1:876:5924 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716180 r8:80287e08 r7:ec8c9e60 r6:8576fd00 r5:850a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ffd40 INFO: task kworker/1:877:5927 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e6406000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:857ddb8c r4:857dd800 r10:61c88647 r9:850aa400 r8:8571622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85716280 r8:80287e08 r7:ec8e1e60 r6:8576fe00 r5:850ab000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:5933 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000013 r6:ec8edd8c r5:850ac800 r4:850ac800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ac800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb897000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857deb8c r4:857de800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857deb8c r4:85716300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ac800 r8:8571632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716300 r8:80287e08 r7:ec8e1e60 r6:8576fe80 r5:850ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e6cf6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857de38c r4:857de000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857de38c r4:85716380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ad400 r8:857163ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716380 r8:80287e08 r7:ec8ede60 r6:8576ff00 r5:850ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f1fb0 to 0xec8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2040 INFO: task kworker/1:881:5934 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e6cf6000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85716400 r8:80287e08 r7:ec8ede60 r6:8576ff80 r5:850abc00 r4:856f2340 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:883 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85716480 r8:80287e08 r7:ec8ede60 r6:8534a000 r5:850aec00 r4:856f2540 Call trace: 1d20: e7120000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:884:5942 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:884 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:84a65400 r4:84a65400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a65400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84a65400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857df38c r4:857df000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e7120000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:850f5d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85741800 r8:857165ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716580 r8:80287e08 r7:ec901e60 r6:8534a100 r5:85741800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2840 INFO: task kworker/1:885:5945 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e760e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb96d000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85716600 r8:80287e08 r7:ec90de60 r6:8534a180 r5:85740000 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:857a6000 r4:857a6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dc78c r4:857dc400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857dc78c r4:85716680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a6000 r8:857166ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716680 r8:80287e08 r7:ec911e60 r6:85716700 r5:857a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2640 INFO: task kworker/1:887:5948 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:857a6c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebab9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: e81bd000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8484cc40 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857a5400 r8:857168ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec8b9fb0 to 0xec8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2cc0 INFO: task kworker/1:889:5951 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e81bd000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:890:5953 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:890 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec919d84 r8:00000002 r7:60000013 r6:ec919d8c r5:857a4800 r4:857a4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6580 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb83000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e538c r4:857e5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e538c r4:85716980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a4800 r8:857169ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716980 r8:80287e08 r7:ec8b9e60 r6:85716a00 r5:857a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2bc0 INFO: task kworker/1:890:5953 is blocked on a mutex likely owned by task kworker/1:480:4781. Call trace: 1d20: e858c000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8484cc40 INFO: task kworker/1:891:5957 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:857a1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r5:00001000 r4:eafbb000 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:892:5958 blocked for more than 464 seconds. r4:85733c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r5:00001000 r4:ebb4b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: e8b4d000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5959 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:85796000 r4:85796000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85796000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85796000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb63000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e4b8c r4:857e4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e4b8c r4:85716c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85796000 r8:85716cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85716c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85716c80 r8:80287e08 r7:ec919e60 r6:85716d00 r5:85796000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d6140 INFO: task kworker/1:893:5959 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d20: e8b4d000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:857e578c r4:85716d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb291d28 to 0xeb291d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5964 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec931d84 r8:00000002 r7:60000113 r6:ec931d8c r5:857a8c00 r4:857a8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec741000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e5f8c r4:857e5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e4f8c r4:857e4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e4f8c r4:85768000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a9800 r8:8576802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768000 r8:80287e08 r7:ec931e60 r6:85768080 r5:857a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d6a80 INFO: task kworker/1:896:5966 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: e973e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:eafbb000 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85768100 r8:80287e08 r7:ec931e60 r6:85768180 r5:857aa400 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:898 state:D stack:0 pid:5970 tgid:5970 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768200 r8:80287e08 r7:ec939e60 r6:85768280 r5:857ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec93dfb0 to 0xec93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d6a40 INFO: task kworker/1:898:5970 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: ea0c7000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5972 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec941d84 r8:00000002 r7:60000113 r6:ec941d8c r5:857abc00 r4:857abc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857abc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec779000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e6b8c r4:857e6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e6b8c r4:85768300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857abc00 r8:8576832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768300 r8:80287e08 r7:ec939e60 r6:85768380 r5:857abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec941fb0 to 0xec941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: ea0c7000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:900:5975 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:900 state:D stack:0 pid:5975 tgid:5975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec945d84 r8:00000002 r7:60000013 r6:ec945d8c r5:857ac800 r4:857ac800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ac800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ed000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e738c r4:857e7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e738c r4:85768400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ac800 r8:8576842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768400 r8:80287e08 r7:ec941e60 r6:85768480 r5:857ac800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: ea5a1000 eafa9000 00000001 80239b98 7f439000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec949d84 r8:00000002 r7:60000113 r6:ec949d8c r5:857ad400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:853c5f8c r4:853c5c00 r4:850f5d80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:857ae000 r4:857ae000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ae000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec94de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f2f80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e438c r4:857e4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e438c r4:85768600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ae000 r8:8576862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768600 r8:80287e08 r7:ec945e60 r6:85768680 r5:857ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec94dfb0 to 0xec94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f2ec0 INFO: task kworker/1:902:5978 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: eaeb8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5980 blocked for more than 464 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5980 tgid:5980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:857aec00 r4:857aec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857aec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec7d1000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857aec00 r8:8576872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768700 r8:80287e08 r7:ec945e60 r6:85768780 r5:857aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec951fb0 to 0xec951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ed300 INFO: task kworker/1:903:5980 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: eaeb8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f5d80 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ed440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e7f8c r4:857e7c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e7f8c r4:85768800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b0000 r8:8576882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768800 r8:80287e08 r7:ec951e60 r6:85768880 r5:857b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec955fb0 to 0xec955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ed1c0 INFO: task kworker/1:904:5983 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: eaeb8000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85768900 r8:80287e08 r7:ec955e60 r6:85768980 r5:857b0c00 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:90090113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5986 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:857b1800 r4:857b1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857b1800 r8:85768a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec96dd84 r8:00000002 r7:60000113 r6:ec96dd8c r5:857b2400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5990 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec979d84 r8:00000002 r7:60000113 r6:ec979d8c r5:857b3000 r4:857b3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856edc80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ec38c r4:857ec000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ec38c r4:85768c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b3000 r8:85768c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85768c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768c00 r8:80287e08 r7:ec92de60 r6:85768c80 r5:857b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ed880 INFO: task kworker/1:908:5990 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:909:5992 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:909 state:D stack:0 pid:5992 tgid:5992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec981d84 r8:00000002 r7:60000013 r6:ec981d8c r5:857b3c00 r4:857b3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856eda40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:857b4800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857b5400 r8:85716fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:857b6000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec9af000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:913:6000 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:913 state:D stack:0 pid:6000 tgid:6000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9add84 r8:00000002 r7:60000013 r6:ec9add8c r5:857b6c00 r4:857b6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b2c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ecb8c r4:857ec800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ecb8c r4:8581c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b6c00 r8:8581c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581c100 r8:80287e08 r7:ec9a5e60 r6:8581c180 r5:857b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b080 INFO: task kworker/1:913:6000 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:6002 blocked for more than 465 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:6002 tgid:6002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b9d84 r8:00000002 r7:60000013 r6:ec9b9d8c r5:85850000 r4:85850000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85850000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85850000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49b5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:6004 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r5:00001000 r4:ec9c3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b480 INFO: task kworker/1:915:6004 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b7c0 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eeb8c r4:857ee800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eeb8c r4:8581c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85851800 r8:8581c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581c400 r8:80287e08 r7:ec9b9e60 r6:8581c480 r5:85851800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b3c0 INFO: task kworker/1:916:6005 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:6010 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:6010 tgid:6010 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85853000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b940 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8581c500 r8:80287e08 r7:ec9cde60 r6:8581c580 r5:85853000 r4:8581b680 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5b9000 r7:ddde2d80 r6:83018200 r5:857ee38c r4:8581c600 r4:00000001 r4:8581b880 Call trace: dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581be40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85854800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eff8c r4:857efc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eff8c r4:8581c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85854800 r8:8581c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581c800 r8:80287e08 r7:ec9cde60 r6:8581c880 r5:85854800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581bcc0 INFO: task kworker/1:920:6013 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:6015 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:6015 tgid:6015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d5d84 r8:00000002 r7:60000013 r6:ec9d5d8c r5:85855400 r4:85855400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85855400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856edf00 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec9d5fb0 to 0xec9d5ff8) Workqueue: events bpf_prog_free_deferred dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:922:6016 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:922 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:85856c00 r4:85856c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85856c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85856000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85856000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85856000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85888b8c r4:85888800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85888b8c r4:8581cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85856000 r8:8581cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581cb00 r8:80287e08 r7:ec9dde60 r6:8581cb80 r5:85856000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85829300 INFO: task kworker/1:923:6020 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 90090113 ffffffff r4:df9dddc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:924:6022 blocked for more than 465 seconds. r10:8291a684 r9:ec9e5d84 r8:00000002 r7:60000013 r6:ec9e5d8c r5:857b8000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8581cc00 Exception stack(0xec9e5fb0 to 0xec9e5ff8) r4:85829500 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:925:6023 blocked for more than 465 seconds. task:kworker/1:925 state:D stack:0 pid:6023 tgid:6023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9e1d84 r8:00000002 r7:60000113 r6:ec9e1d8c r5:857b8c00 r4:857b8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588938c r4:85889000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588938c r4:8581cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b8c00 r8:8581cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581cd00 r8:80287e08 r7:ec9e5e60 r6:8581cd80 r5:857b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e1fb0 to 0xec9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85829080 INFO: task kworker/1:925:6023 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:6026 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:857b9800 r4:857b9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829840 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec9e9fb0 to 0xec9e9ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:6027 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:6027 tgid:6027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000113 r6:ec9edd8c r5:857ba400 r4:857ba400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ba400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829700 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85768f80 r8:80287e08 r7:ec9e9e60 r6:8581cf00 r5:857ba400 r4:858297c0 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 90090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:928:6030 blocked for more than 465 seconds. r4:857bb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc01000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588a38c r4:8588a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588a38c r4:85836000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bb000 r8:8583602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836000 r8:80287e08 r7:ec9e9e60 r6:85836080 r5:857bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858297c0 INFO: task kworker/1:928:6030 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec9f5d84 r8:00000002 r7:60000113 r6:ec9f5d8c r5:857bbc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829b80 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec9f5fb0 to 0xec9f5ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8334b7c0 task:kworker/1:930 state:D stack:0 pid:6035 tgid:6035 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85829fc0 INFO: task kworker/1:930:6035 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:6037 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000013 r6:ec9fdd8c r5:857bd400 r4:857bd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857bd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85829d40 r5:00001000 r4:ebc8f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588ab8c r4:8588a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588ab8c r4:85836300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bd400 r8:8583632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836300 r8:80287e08 r7:ec9f9e60 r6:85836380 r5:857bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581b3c0 INFO: task kworker/1:931:6037 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/1:932:6038 blocked for more than 465 seconds. r4:857be000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8588b78c r4:85836400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:6040 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca09d84 r8:00000002 r7:60000013 r6:eca09d8c r5:857bec00 r4:857bec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857bec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856edc40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857bec00 r8:8583652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85858000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca0de08 r5:00001000 r4:ebd3f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeca0dfb0 to 0xeca0dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85843300 INFO: task kworker/1:934:6042 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 7f839000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 90090113 ffffffff r5:90090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r4:85858c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r5:00001000 r4:ebd29000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r5:90090113 r4:80239bb0 r4:df9dddc0 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca19e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85859800 r8:8583682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:6048 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca15d84 r8:00000002 r7:60000013 r6:eca15d8c r5:8585a400 r4:8585a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858434c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585a400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588a78c r4:8588a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588a78c r4:85836900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585a400 r8:8583692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836900 r8:80287e08 r7:eca19e60 r6:85836980 r5:8585a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca15fb0 to 0xeca15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858435c0 INFO: task kworker/1:937:6048 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:938 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85836a00 r8:80287e08 r7:eca15e60 r6:85836a80 r5:8585b000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:939:6052 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:939 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8585bc00 r4:8585bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85843ac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85894b8c r4:85894800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85894b8c r4:85836b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585bc00 r8:85836b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836b00 r8:80287e08 r7:eca21e60 r6:85836b80 r5:8585bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85843900 INFO: task kworker/1:939:6052 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/1:940:6054 blocked for more than 465 seconds. r10:8291a684 r9:eca1dd84 r8:00000002 r7:60000013 r6:eca1dd8c r5:8585d400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:941:6055 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca31d84 r8:00000002 r7:60000013 r6:eca31d8c r5:8585c800 r4:8585c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85843f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8585c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec669000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85894f8c r4:85894c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85894f8c r4:85836d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585c800 r8:85836d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836d00 r8:80287e08 r7:eca1de60 r6:85836d80 r5:8585c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85843a00 INFO: task kworker/1:941:6055 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:6058 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:6058 tgid:6058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:85740c00 r4:85740c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85740c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583fb80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ec67b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652f8c r4:85652c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85652f8c r4:8534a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85740c00 r8:8534a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534a200 r8:80287e08 r7:ec621e60 r6:8534a280 r5:85740c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8583f6c0 INFO: task kworker/0:517:6058 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:6060 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:942 state:D stack:0 pid:6060 tgid:6060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca35d84 r8:00000002 r7:60000013 r6:eca35d8c r5:85743000 r4:85743000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85743000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85745400 r8:85836eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836e80 r8:80287e08 r7:eca1de60 r6:8534a380 r5:85745400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85843fc0 INFO: task kworker/1:943:6064 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:6067 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:6067 tgid:6067 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85746c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:6069 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85746000 r4:8291a680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:946 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:85743c00 r4:85743c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85743c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85743c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85896b8c r4:85896800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85896b8c r4:85846000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85743c00 r8:8584602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846000 r8:80287e08 r7:ec97de60 r6:8534a500 r5:85743c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85849480 Workqueue: events bpf_prog_free_deferred dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eca45d84 r8:00000002 r7:60000013 r6:eca45d8c r5:85744800 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846080 r8:80287e08 r7:eca41e60 r6:85846100 r5:85744800 r4:85849540 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:df9dddc0 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858496c0 INFO: task kworker/1:948:6074 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6076 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6076 tgid:6076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca3dd84 r8:00000002 r7:60000113 r6:eca3dd8c r5:85742400 r4:85742400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85742400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85742400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565378c r4:85653400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85742400 r8:8534a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:949:6078 blocked for more than 465 seconds. r5:850ae000 r4:8291a680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:6080 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:6080 tgid:6080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca51d84 r8:00000002 r7:60000113 r6:eca51d8c r5:850c0000 r4:850c0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849c80 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846300 r8:80287e08 r7:eca2de60 r6:8534a700 r5:850c0000 r4:85849a40 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eca55d84 r8:00000002 r7:60000113 r6:eca55d8c r5:850c0c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846380 r8:80287e08 r7:eca51e60 r6:8534a780 r5:850c0c00 r4:85849c80 INFO: task kworker/1:951:6082 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:6085 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:6085 tgid:6085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca61d84 r8:00000002 r7:60000013 r6:eca61d8c r5:850c3000 r4:850c3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846400 r8:80287e08 r7:eca51e60 r6:8534a800 r5:850c3000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85849b80 INFO: task kworker/1:952:6085 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:953:6087 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:953 state:D stack:0 pid:6087 tgid:6087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850c3c00 r8:858464ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:954 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca6de08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850c2400 r8:8584652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850c1800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846580 r8:80287e08 r7:eca61e60 r6:8534a980 r5:850c1800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80090113 r4:80239bb0 r4:df9dddc0 r5:00001000 r4:dffe3000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:956:6093 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:956 state:D stack:0 pid:6093 tgid:6093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca81d84 r8:00000002 r7:60000113 r6:eca81d8c r5:850c4800 r4:850c4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589c78c r4:8589c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589c78c r4:85846600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c4800 r8:8584662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846600 r8:80287e08 r7:eca61e60 r6:8534aa00 r5:850c4800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85769380 INFO: task kworker/1:958:6097 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:959:6100 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:959 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca9dd84 r8:00000002 r7:60000013 r6:eca9dd8c r5:85780000 r4:85780000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85780000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca9de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec747000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589db8c r4:8589d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589db8c r4:85846780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:858467ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846780 r8:80287e08 r7:eca91e60 r6:8534ac00 r5:85780000 r4:00000001 Exception stack(0xeca9dfb0 to 0xeca9dff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85783000 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:6102 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:960 state:D stack:0 pid:6102 tgid:6102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaa5d84 r8:00000002 r7:60000113 r6:ecaa5d8c r5:85783c00 r4:85783c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85783c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a5000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85846800 r8:80287e08 r7:eca9de60 r6:8534ad00 r5:85783c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:8589df8c r4:85846880 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:962:6105 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:962 state:D stack:0 pid:6105 tgid:6105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecab1d84 r8:00000002 r7:60000013 r6:ecab1d8c r5:85782400 r4:85782400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85782400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85782400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589e38c r4:8589e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589e38c r4:85846900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85782400 r8:8584692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846900 r8:80287e08 r7:ecaa5e60 r6:8534ae00 r5:85782400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857698c0 INFO: task kworker/1:962:6105 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r5:85781800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:964 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85786c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589cf8c r4:8589cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589cf8c r4:85846a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786c00 r8:85846a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846a00 r8:80287e08 r7:ecaa5e60 r6:8534af00 r5:85786c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac1fb0 to 0xecac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85769a00 INFO: task kworker/1:964:6109 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:965:6111 blocked for more than 465 seconds. r4:85786000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85769cc0 r5:8589eb8c r4:8589e800 r4:85846a80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85769c00 INFO: task kworker/1:965:6111 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:850c6000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85846b00 Exception stack(0xecad1fb0 to 0xecad1ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:967:6115 blocked for more than 465 seconds. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec835000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589f38c r4:8589f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f38c r4:85846b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c6c00 r8:85846bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846b80 r8:80287e08 r7:ecac1e60 r6:85758080 r5:850c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85769e40 INFO: task kworker/1:967:6115 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecae1d84 r8:00000002 r7:60000113 r6:ecae1d8c r5:858c0c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c0c00 r8:85846c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846c00 r8:80287e08 r7:ecac1e60 r6:85758100 r5:858c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576e080 INFO: task kworker/1:968:6117 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576e200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589f78c r4:8589f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f78c r4:85846c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c0000 r8:85846cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846c80 r8:80287e08 r7:ecac1e60 r6:85758180 r5:858c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaedfb0 to 0xecaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576e300 INFO: task kworker/1:969:6120 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:971:6124 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf9d84 r8:00000002 r7:60000113 r6:ecaf9d8c r5:858c3c00 r4:858c3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:6128 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:973 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb09d84 r8:00000002 r7:60000013 r6:ecb09d8c r5:858c6000 r4:858c6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576edc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec987000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a1f8c r4:858a1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a1f8c r4:85846e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c6000 r8:85846eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85846e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85846e80 r8:80287e08 r7:ecb01e60 r6:85758380 r5:858c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb09fb0 to 0xecb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576e8c0 INFO: task kworker/1:973:6128 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:974:6129 blocked for more than 465 seconds. r4:858c4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb0de08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:975 state:D stack:0 pid:6131 tgid:6131 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a178c r4:858a1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a178c r4:85836f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c3000 r8:85836fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85836f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85836f80 r8:80287e08 r7:ecb09e60 r6:85758480 r5:858c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576ea00 INFO: task kworker/1:975:6131 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:6133 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:976 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb1dd84 r8:00000002 r7:60000013 r6:ecb1dd8c r5:858c6c00 r4:858c6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858c6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576e700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec971000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8581cf80 r8:80287e08 r7:ecb09e60 r6:85758500 r5:858c6c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576e9c0 INFO: task kworker/1:976:6133 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb449000 r5:858a238c r4:858a2000 r7:ddde2d80 r6:83018200 r5:858a238c r4:85625000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85883000 r8:8562502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85625000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85625000 r8:80287e08 r7:ecb09e60 r6:85625080 r5:85883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576ec80 INFO: task kworker/1:977:6136 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:85883c00 r4:85883c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85883c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576e080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a278c r4:858a2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85883c00 r8:8562512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:6139 blocked for more than 465 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca59d84 r8:00000002 r7:60000013 r6:eca59d8c r5:85884800 r4:85884800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85884800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ec80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85884800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb697000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653f8c r4:85653c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85653f8c r4:85625200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85625200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85885400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb35e08 r5:00001000 r4:eb495000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857fee80 INFO: task kworker/0:520:6143 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85886c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba7d000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb929000 r7:ddde2d80 r6:83018200 r5:858a2b8c r4:85625400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:6150 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb45d84 r8:00000002 r7:60000013 r6:ecb45d8c r5:85880000 r4:85880000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85880000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fe840 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85758780 r8:80287e08 r7:ecb2de60 r6:85625500 r5:85880000 r4:84185080 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:6151 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:6151 tgid:6151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85882400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85882400 r8:856255ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ef78c r4:85758680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c2400 r8:857586ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758680 r8:80287e08 r7:ecb2de60 r6:85625680 r5:858c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185080 INFO: task kworker/0:523:6152 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:6155 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb51d84 r8:00000002 r7:60000013 r6:ecb51d8c r5:8585ec00 r4:8585ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ee78c r4:847ee400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ee78c r4:85758700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585ec00 r8:8575872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758700 r8:80287e08 r7:ecb2de60 r6:85625700 r5:8585ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6156 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb55d84 r8:00000002 r7:60000013 r6:ecb55d8c r5:8585e000 r4:8585e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb55e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8585e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:00001000 r4:ebc89000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r5:00001000 r4:ebc5d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecb59fb0 to 0xecb59ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6161 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6161 tgid:6161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb65d84 r8:00000002 r7:60000113 r6:ecb65d8c r5:858ca400 r4:858ca400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ca400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85758900 Exception stack(0xecb65fb0 to 0xecb65ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:858c8c00 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575cf8c r4:8575cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575cf8c r4:85758980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858c8c00 r8:857589ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758980 r8:80287e08 r7:ecb65e60 r6:85625900 r5:858c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb69fb0 to 0xecb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185540 INFO: task kworker/0:528:6162 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 r5:80090113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecb71d84 r8:00000002 r7:60000013 r6:ecb71d8c r5:858c9800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841859c0 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85758a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758a80 r8:80287e08 r7:ecb65e60 r6:85625a00 r5:858cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb79fb0 to 0xecb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185a80 INFO: task kworker/0:530:6166 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6168 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:858cd400 r4:858cd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858cd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd59000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575c38c r4:8575c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575c38c r4:85758b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cd400 r8:85758b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758b00 r8:80287e08 r7:ecb65e60 r6:85625a80 r5:858cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185bc0 INFO: task kworker/0:531:6168 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:532 state:D stack:0 pid:6170 tgid:6170 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185d40 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cc800 r8:85758c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758c00 r8:80287e08 r7:ecb65e60 r6:85625b00 r5:858cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185bc0 INFO: task kworker/0:532:6170 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80079000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 r4:849f1580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdfb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575e38c r4:8575e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575e38c r4:85758b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858cbc00 r8:85758bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758b80 r8:80287e08 r7:ecb65e60 r6:85625b80 r5:858cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185800 INFO: task kworker/0:533:6172 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:858ce000 r4:858ce000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ce000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fe040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575e78c r4:8575e400 r7:dddced80 r6:83018000 r5:8575e78c r4:85758c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:6176 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecba1d84 r8:00000002 r7:60000113 r6:ecba1d8c r5:85860c00 r4:85860c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85860c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84185e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec667000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575eb8c r4:8575e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575eb8c r4:85758d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85860c00 r8:85758d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85758d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85758d00 r8:80287e08 r7:ecb65e60 r6:85625c80 r5:85860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84185800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecba9d84 r8:00000002 r7:60000113 r6:ecba9d8c r5:85860000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xecba9fb0 to 0xecba9ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:6180 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:6180 tgid:6180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbb1d84 r8:00000002 r7:60000113 r6:ecbb1d8c r5:85861800 r4:85861800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85861800 r8:85758e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:6182 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbb9d84 r8:00000002 r7:60000013 r6:ecbb9d8c r5:85862400 r4:85862400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85862400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85862400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575f78c r4:8575f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575f78c r4:856e3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85862400 r8:856e302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3000 r8:80287e08 r7:ecb65e60 r6:85625e00 r5:85862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r9:83018005 r8:85863000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r10:61c88647 r9:85863000 r8:856e30ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:6186 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:6186 tgid:6186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbcdd84 r8:00000002 r7:60000113 r6:ecbcdd8c r5:85863c00 r4:85863c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85863c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9580 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:85864800 r4:85864800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85864800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85864800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575db8c r4:8575d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575db8c r4:856e3180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85864800 r8:856e31ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3180 r8:80287e08 r7:ecb65e60 r6:85625f80 r5:85864800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e9740 INFO: task kworker/0:541:6188 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85865400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9800 r7:dddced80 r6:83018000 r5:847eeb8c r4:856e3200 r10:00000000 r9:856e3200 r8:80287e08 r7:ecb65e60 r6:85846f80 r5:85865400 r4:856e9700 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:6192 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:6192 tgid:6192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:85866000 r4:85866000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85866000 r8:856e32ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85760f8c r4:85760c00 r10:61c88647 r9:85866c00 r8:856e332c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e9c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576138c r4:85761000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576138c r4:856e3380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85868c00 r8:856e33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3380 r8:80287e08 r7:ecb65e60 r6:84a20100 r5:85868c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc19fb0 to 0xecc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e9b40 INFO: task kworker/0:545:6196 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:6198 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc29d84 r8:00000002 r7:60000113 r6:ecc29d8c r5:85868000 r4:85868000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85868000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc29e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85822540 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85868000 r8:856e342c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8576038c r4:85760000 r7:dddced80 r6:83018000 r5:8576038c r4:856e3500 r4:856e3500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3500 r8:80287e08 r7:ecc29e60 r6:84a20200 r5:8586a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856e9f80 INFO: task kworker/0:547:6200 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:548:6202 blocked for more than 466 seconds. r4:8586b000 r4:00000000 r4:00000000 r5:85761b8c r4:85761800 r7:dddced80 r6:83018000 r5:85761b8c r4:856e3480 r10:00000000 r9:856e3480 r8:80287e08 r7:ecc29e60 r6:84a20280 r5:8586b000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a15f40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc3d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576238c r4:85762000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576238c r4:856e3580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d2400 r8:856e35ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3580 r8:80287e08 r7:ecc29e60 r6:856e3600 r5:850d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858220c0 INFO: task kworker/0:549:6205 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 r4:8334b7c0 task:kworker/0:550 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:850d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85762b8c r4:85762800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85762b8c r4:856e3680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d3c00 r8:856e36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3680 r8:80287e08 r7:ecc29e60 r6:856e3700 r5:850d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85822380 INFO: task kworker/0:550:6207 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:551:6208 blocked for more than 466 seconds. Call trace: r5:850d4800 r4:8291a680 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85760b8c r4:85760800 r10:61c88647 r9:850d4800 r8:856e37ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc5dd84 r8:00000002 r7:60000113 r6:ecc5dd8c r5:850d5400 r4:850d5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc5de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85822740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc65000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576338c r4:85763000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576338c r4:856e3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d5400 r8:856e38ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3880 r8:80287e08 r7:ecc29e60 r6:856e3900 r5:850d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85822640 INFO: task kworker/0:552:6211 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850d6000 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8576378c r4:85763400 r10:61c88647 r9:850d6000 r8:856e39ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:554:6216 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:6216 tgid:6216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc89d84 r8:00000002 r7:60000013 r6:ecc89d8c r5:8586e000 r4:8586e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc89e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85822b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8586e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc8f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85761f8c r4:85761c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85761f8c r4:856e3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586e000 r8:856e3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3a80 r8:80287e08 r7:ecc69e60 r6:84a20300 r5:8586e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc89fb0 to 0xecc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85822640 INFO: task kworker/0:554:6216 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:555:6217 blocked for more than 466 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8586ec00 r8:856e3b2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:6219 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecca1d84 r8:00000002 r7:60000113 r6:ecca1d8c r5:8586bc00 r4:8586bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586bc00 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8586bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 r5:85763b8c r4:85763800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:8529a38c r4:8529a000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:6222 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccb1d84 r8:00000002 r7:60000013 r6:eccb1d8c r5:8586c800 r4:8586c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85822dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8586c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576438c r4:85764000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576438c r4:856e3c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586c800 r8:856e3cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:856e3c80 r8:80287e08 r7:eccade60 r6:84a20500 r5:8586c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85870c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafff000 r7:dddced80 r6:83018000 r5:8576538c r4:856e3d00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:560:6229 blocked for more than 466 seconds. r4:85871800 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7ad000 r5:85765b8c r4:85765800 r4:856e3d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85872400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r10:61c88647 r9:85872400 r8:856e3e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:6232 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:6232 tgid:6232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccc1d84 r8:00000002 r7:60000113 r6:eccc1d8c r5:85873000 r4:85873000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85873000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85873000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85765f8c r4:856e3e80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:6234 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:6234 tgid:6234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc85d84 r8:00000002 r7:60000013 r6:ecc85d8c r5:85873c00 r4:85873c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85873c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc85e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578c700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a378c r4:858a3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a378c r4:84a20780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85873c00 r8:84a207ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a20780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a20780 r8:80287e08 r7:ecb39e60 r6:84a20800 r5:85873c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc85fb0 to 0xecc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8578c340 INFO: task kworker/1:982:6234 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:df9dddc0 r5:00001000 r4:dffe3000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:858a338c r4:858a3000 r4:84a20880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:984:6239 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccc5d84 r8:00000002 r7:60000013 r6:eccc5d8c r5:85876000 r4:85876000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85876000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578c880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85876000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb53000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a3b8c r4:858a3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a3b8c r4:84a20980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85876000 r8:84a209ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a20980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a20980 r8:80287e08 r7:ecc85e60 r6:84a20a00 r5:85876000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8578c6c0 INFO: task kworker/1:984:6239 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:985:6240 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:985 state:D stack:0 pid:6240 tgid:6240 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858a3f8c r4:858a3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a3f8c r4:84a20a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85876c00 r8:84a20aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a20a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a20a80 r8:80287e08 r7:eccc5e60 r6:84a20b00 r5:85876c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8578c7c0 INFO: task kworker/1:985:6240 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:6242 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccd1d84 r8:00000002 r7:60000113 r6:eccd1d8c r5:858cec00 r4:858cec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858cec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578cb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:858cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeccd1fb0 to 0xeccd1ff8) r4:8578c400 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:987:6244 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:987 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccd5d84 r8:00000002 r7:60000113 r6:eccd5d8c r5:85869800 r4:85869800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85869800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84a20c80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a20d80 r8:80287e08 r7:eccd5e60 r6:85758e80 r5:85875400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:6247 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eccc9d84 r8:00000002 r7:60000113 r6:eccc9d8c r5:850d6c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85758f00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r10:61c88647 r9:850d0000 r8:84a20e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6252 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccf1d84 r8:00000002 r7:60000013 r6:eccf1d8c r5:850d1800 r4:850d1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582c700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec861000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592c38c r4:8592c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592c38c r4:84a20e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d1800 r8:84a20eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a20e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a20e80 r8:80287e08 r7:ecce9e60 r6:856e3f80 r5:850d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c080 INFO: task kworker/1:990:6252 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec79b000 r5:8592d38c r4:8592d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592d38c r4:84a20f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85880c00 r8:84a20f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a20f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a20f00 r8:80287e08 r7:eccf1e60 r6:85842000 r5:85880c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf9fb0 to 0xeccf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c180 INFO: task kworker/1:991:6254 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a20f80 Exception stack(0xeccfdfb0 to 0xeccfdff8) r4:8582c380 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:993 state:D stack:0 pid:6257 tgid:6257 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 r4:00000000 r5:8592db8c r4:8592d800 r10:61c88647 r9:850d0c00 r8:8582d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d000 r8:80287e08 r7:eccf1e60 r6:85842100 r5:850d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c4c0 INFO: task kworker/1:993:6257 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:6260 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:6260 tgid:6260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd0dd84 r8:00000002 r7:60000113 r6:ecd0dd8c r5:85198000 r4:85198000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ca00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85198000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592df8c r4:8592dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592df8c r4:8582d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198000 r8:8582d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d080 r8:80287e08 r7:eccf1e60 r6:85842180 r5:85198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c940 INFO: task kworker/1:994:6260 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85198c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8582d100 Exception stack(0xecd11fb0 to 0xecd11ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ecd19d84 r8:00000002 r7:60000013 r6:ecd19d8c r5:8519a400 r4:8519a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8519a400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca7b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85930b8c r4:85930800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85930b8c r4:8582d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519a400 r8:8582d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d180 r8:80287e08 r7:ecd0de60 r6:85842280 r5:8519a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582c900 INFO: task kworker/1:996:6263 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:6265 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:6265 tgid:6265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:85199800 r4:85199800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85199800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582c780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85199800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8592ef8c r4:8592ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecd21fb0 to 0xecd21ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:6267 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:998 state:D stack:0 pid:6267 tgid:6267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd29d84 r8:00000002 r7:60000113 r6:ecd29d8c r5:8519b000 r4:8519b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8519b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec909000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592f38c r4:8592f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592f38c r4:8582d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519b000 r8:8582d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d280 r8:80287e08 r7:ecd19e60 r6:85842380 r5:8519b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd29fb0 to 0xecd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582cbc0 INFO: task kworker/1:998:6267 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:00000000 r5:8529a38c r4:8529a000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:999:6269 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:999 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd31d84 r8:00000002 r7:60000113 r6:ecd31d8c r5:8519bc00 r4:8519bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 r5:00001000 r4:ec967000 r5:8592f78c r4:8592f400 r4:8582d300 Exception stack(0xecd31fb0 to 0xecd31ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r5:00001000 r4:dffe3000 r4:849f1580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:6271 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:6271 tgid:6271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd39d84 r8:00000002 r7:60000113 r6:ecd39d8c r5:8519e000 r4:8519e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ccc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8519e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec985000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592e78c r4:8592e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592e78c r4:8582d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:8582d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d380 r8:80287e08 r7:ecd19e60 r6:85842480 r5:8519e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582cbc0 INFO: task kworker/1:1000:6271 is blocked on a mutex likely owned by task kworker/0:12:3148. Call trace: dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:1001:6273 blocked for more than 466 seconds. r4:8519d400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8519d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592ff8c r4:8592fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592ff8c r4:8582d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519d400 r8:8582d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d400 r8:80287e08 r7:ecd19e60 r6:85842500 r5:8519d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a15ac0 INFO: task kworker/1:1001:6273 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:1002 state:D stack:0 pid:6275 tgid:6275 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8592fb8c r4:8582d480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8519ec00 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8592d78c r4:8592d400 r10:61c88647 r9:8519ec00 r8:8582d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1004:6279 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1004 state:D stack:0 pid:6279 tgid:6279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd01d84 r8:00000002 r7:60000113 r6:ecd01d8c r5:85870000 r4:85870000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85870000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85870000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca65000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593038c r4:85930000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593038c r4:8582d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85870000 r8:8582d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d580 r8:80287e08 r7:ecd19e60 r6:8582d600 r5:85870000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd01fb0 to 0xecd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552b040 INFO: task kworker/1:1004:6279 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1005:6282 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1005 state:D stack:0 pid:6282 tgid:6282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ecd55d84 r8:00000002 r7:60000013 r6:ecd55d8c r5:85878000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85931b8c r4:85931800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552b3c0 INFO: task kworker/1:1005:6282 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/1:1006:6283 blocked for more than 466 seconds. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b5c0 r5:00001000 r4:eca8d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593138c r4:85931000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593138c r4:8582d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85878c00 r8:8582d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582d780 r8:80287e08 r7:ecd55e60 r6:8582d800 r5:85878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce1fb0 to 0xecce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552b080 INFO: task kworker/1:1006:6283 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1007:6286 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1007 state:D stack:0 pid:6286 tgid:6286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd5dd84 r8:00000002 r7:60000013 r6:ecd5dd8c r5:85879800 r4:85879800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85879800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:8593078c r4:85930400 r7:ddde2d80 r6:83018200 r5:8593078c r4:8582d880 r10:00000000 r9:8582d880 r8:80287e08 r7:ecd55e60 r6:8582d900 r5:85879800 INFO: task kworker/1:1007:6286 is blocked on a mutex likely owned by task kworker/0:12:3148. dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1008:6289 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1008 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552b9c0 r5:85931f8c r4:85931c00 r10:61c88647 r9:8587a400 r8:8582d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:6290 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:6290 tgid:6290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd6dd84 r8:00000002 r7:60000013 r6:ecd6dd8c r5:8587b000 r4:8587b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8587b000 r8:8582daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r5:00001000 r4:dffe3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:8587bc00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8587bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593278c r4:85932400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593278c r4:8582db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587bc00 r8:8582dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582db80 r8:80287e08 r7:ecd6de60 r6:8582dc00 r5:8587bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd61fb0 to 0xecd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8552ba80 INFO: task kworker/1:1010:6292 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8582dc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80090113 r4:80239bb0 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:6296 blocked for more than 466 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd75d84 r8:00000002 r7:60000113 r6:ecd75d8c r5:8587d400 r4:8587d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85834900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8587d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85932f8c r4:85932c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85932f8c r4:8582dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587d400 r8:8582ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582dd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582dd80 r8:80287e08 r7:ecd71e60 r6:8582de00 r5:8587d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:1013 state:D stack:0 pid:6298 tgid:6298 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb05000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593338c r4:85933000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593338c r4:8582de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587e000 r8:8582deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8582de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8582de80 r8:80287e08 r7:ecd75e60 r6:8582df00 r5:8587e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85621000 INFO: task kworker/1:1013:6298 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:8587ec00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8561f000 Exception stack(0xecd7dfb0 to 0xecd7dff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80090113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:6303 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:6303 tgid:6303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd81d84 r8:00000002 r7:60000113 r6:ecd81d8c r5:85968000 r4:85968000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85968000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856217c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85968000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:858a1b8c r4:858a1800 r7:ddde2d80 r6:83018200 r5:858a1b8c r4:8561f100 r4:00000001 r4:85621240 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecb5dd84 r8:00000002 r7:60000013 r6:ecb5dd8c r5:85968c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85933b8c r4:8561f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85968c00 r8:8561f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561f200 r8:80287e08 r7:ecd81e60 r6:8561f280 r5:85968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb5dfb0 to 0xecb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85621340 INFO: task kworker/1:1016:6304 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85969800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8593238c r4:85932000 r7:ddde2d80 r6:83018200 r5:8593238c r4:8561f300 r10:00000000 r9:8561f300 r8:80287e08 r7:ecd81e60 r6:8561f380 r5:85969800 r4:85621340 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:8596a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbade08 r9:83018205 r8:8596a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r10:61c88647 r9:8596a400 r8:8561f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85621780 INFO: task kworker/1:1018:6308 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1019:6311 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1019 state:D stack:0 pid:6311 tgid:6311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbbdd84 r8:00000002 r7:60000113 r6:ecbbdd8c r5:8596b000 r4:8596b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8596b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85621d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8596b000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbff000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85938b8c r4:85938800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85938b8c r4:8561f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596b000 r8:8561f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561f500 r8:80287e08 r7:ecbade60 r6:8561f580 r5:8596b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8596bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r7:ddde2d80 r6:83018200 r5:8593838c r4:8561f600 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1021:6315 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1021 state:D stack:0 pid:6315 tgid:6315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:8596c800 r4:8596c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8596c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552bb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8596c800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd37000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85939b8c r4:85939800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85939b8c r4:8561f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8596c800 r8:8561f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561f700 r8:80287e08 r7:ecbbde60 r6:8561f780 r5:8596c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85621cc0 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ecbd9d84 r8:00000002 r7:60000013 r6:ecbd9d8c r5:8596d400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8593938c r4:85939000 r7:ddde2d80 r6:83018200 r5:8593938c r4:8561f800 r10:00000000 r9:8561f800 r8:80287e08 r7:ecbf5e60 r6:8561f880 r5:8596d400 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 805c3000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:6318 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:6318 tgid:6318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc11d84 r8:00000002 r7:60000013 r6:ecc11d8c r5:8596e000 r4:8596e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8596e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:8593978c r4:85939400 r10:61c88647 r9:8596e000 r8:8561f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:6327 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:6327 tgid:6327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:85970000 r4:85970000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85970000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766b8c r4:85766800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85766b8c r4:85842800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85970000 r8:8584282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842800 r8:80287e08 r7:eccc9e60 r6:8561fc00 r5:85970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 task:kworker/0:565 state:D stack:0 pid:6330 tgid:6330 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc45e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8576738c r4:85842880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e8000 r8:858428ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842880 r8:80287e08 r7:eccc9e60 r6:85842900 r5:858e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc45fb0 to 0xecc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85601e80 INFO: task kworker/0:565:6330 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85767f8c r4:85767c00 r10:61c88647 r9:858ea400 r8:858429ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:567:6357 blocked for more than 467 seconds. r4:858eb000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:858eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:8493c38c r4:85842a80 Exception stack(0xecd99fb0 to 0xecd99ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:6359 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdd9d84 r8:00000002 r7:60000113 r6:ecdd9d8c r5:858ec800 r4:858ec800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858ec800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847506c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ff000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847efb8c r4:847ef800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847efb8c r4:85842b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ec800 r8:85842bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842b80 r8:80287e08 r7:ecdd5e60 r6:85842c00 r5:858ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85628bc0 INFO: task kworker/0:568:6359 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:858ebc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a035c0 r5:00001000 r4:ec8c5000 r5:859c7f8c r4:859c7c00 r7:dddced80 r6:83018000 r5:859c7f8c r4:85842c80 r10:61c88647 r9:858ebc00 r8:85842cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842c80 r8:80287e08 r7:ecdd5e60 r6:85842d00 r5:858ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750680 INFO: task kworker/0:569:6444 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:6447 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:6447 tgid:6447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea5d84 r8:00000002 r7:60000113 r6:ecea5d8c r5:858ed400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8420a300 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8493d38c r4:8493d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493d38c r4:85842d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ed400 r8:85842dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842d80 r8:80287e08 r7:ecea1e60 r6:85842e00 r5:858ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750740 INFO: task kworker/0:570:6447 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:6452 blocked for more than 467 seconds. task:kworker/0:571 state:D stack:0 pid:6452 tgid:6452 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85766f8c r4:85766c00 r7:dddced80 r6:83018000 r5:85766f8c r4:85842e80 r10:61c88647 r9:858e8c00 r8:85842eac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:6454 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:6454 tgid:6454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece45d84 r8:00000002 r7:60000113 r6:ece45d8c r5:85976c00 r4:85976c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85976c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece45e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8420ae40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85976c00 r7:00000000 r6:83018000 r5:00001000 r4:7f10d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca87000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c7b8c r4:859c7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c7b8c r4:85842f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85842f80 r8:80287e08 r7:ecea5e60 r6:8561fc80 r5:85976c00 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:573:6455 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r5:85975400 r4:8291a680 r4:00000000 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8580838c r4:85808000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580838c r4:85842680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85975400 r8:858426ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85842680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85842680 r8:80287e08 r7:ecea5e60 r6:8561fd00 r5:85975400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdddfb0 to 0xecdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a880 INFO: task kworker/0:573:6455 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85976000 r8:85a1402c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85973c00 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 r5:85808f8c r4:85808c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85973c00 r8:85a140ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14080 r8:80287e08 r7:eceb1e60 r6:8561fe00 r5:85973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a19140 INFO: task kworker/0:575:6461 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:6464 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecec5d84 r8:00000002 r7:60000013 r6:ecec5d8c r5:85973000 r4:85973000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85973000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a19440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85973000 r7:00000000 r6:83018000 r5:00001000 r4:7f11b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb85000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580978c r4:85809400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580978c r4:85a14100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85973000 r8:85a1412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14100 r8:80287e08 r7:eceb9e60 r6:8561fe80 r5:85973000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec5fb0 to 0xecec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a19240 INFO: task kworker/0:576:6464 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:577:6466 blocked for more than 467 seconds. r10:8291a684 r9:ecec9d84 r8:00000002 r7:60000013 r6:ecec9d8c r5:85972400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:6468 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ececdd84 r8:00000002 r7:60000013 r6:ececdd8c r5:85970c00 r4:85970c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ececde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a19380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85970c00 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580938c r4:85809000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580938c r4:85a14200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85970c00 r8:85a1422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14200 r8:80287e08 r7:ecec9e60 r6:8561ff80 r5:85970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xececdfb0 to 0xececdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a194c0 INFO: task kworker/0:578:6468 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:6469 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced1d84 r8:00000002 r7:60000113 r6:eced1d8c r5:85974800 r4:85974800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85974800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a197c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85974800 r7:00000000 r6:83018000 r5:00001000 r4:7f121000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85809f8c r4:85809c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85809f8c r4:85a14280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85974800 r8:85a142ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14280 r8:80287e08 r7:ececde60 r6:8582df80 r5:85974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a19100 INFO: task kworker/0:579:6469 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:851f0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r9:83018005 r8:851f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 r5:8580a78c r4:8580a400 r10:61c88647 r9:851f0c00 r8:85a1432c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:851f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee5d84 r8:00000002 r7:60000013 r6:ecee5d8c r5:851f0000 r4:851f0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a19a40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc2d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580ab8c r4:8580a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580ab8c r4:85a14400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f0000 r8:85a1442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14400 r8:80287e08 r7:ecee1e60 r6:85a0d100 r5:851f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a198c0 INFO: task kworker/0:582:6475 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eceedd84 r8:00000002 r7:60000113 r6:eceedd8c r5:851f1800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a14480 dfa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6479 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:6479 tgid:6479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef5d84 r8:00000002 r7:60000013 r6:ecef5d8c r5:851f3000 r4:851f3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a19d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc75000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580b38c r4:8580b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580b38c r4:85a14500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f3000 r8:85a1452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14500 r8:80287e08 r7:ecee1e60 r6:85a0d200 r5:851f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef5fb0 to 0xecef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a19d00 INFO: task kworker/0:584:6479 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:df9dddc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:585 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecefde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:851f5400 r8:85a145ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:6483 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:6483 tgid:6483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf05d84 r8:00000002 r7:60000113 r6:ecf05d8c r5:851f4800 r4:851f4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8420ac80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580bb8c r4:8580b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580bb8c r4:85a14680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f4800 r8:85a146ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14680 r8:80287e08 r7:ecee1e60 r6:85a0d300 r5:851f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a980 INFO: task kworker/0:586:6483 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:6485 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851f3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf0de08 r9:83018005 r8:851f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 r5:8580bf8c r4:8580bc00 r10:61c88647 r9:851f3c00 r8:85a1462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a05000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80090113 ffffffff [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ecebdd84 r8:00000002 r7:60000113 r6:ecebdd8c r5:858ee000 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd1d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b0f8c r4:859b0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b0f8c r4:85a14700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858ee000 r8:85a1472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14700 r8:80287e08 r7:ecee1e60 r6:85a14780 r5:858ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecebdfb0 to 0xecebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a05040 INFO: task kworker/0:588:6493 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a057c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f135000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b178c r4:859b1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b178c r4:85a14800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858eec00 r8:85a1482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14800 r8:80287e08 r7:ecebde60 r6:85a14880 r5:858eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:6496 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:6496 tgid:6496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf2dd84 r8:00000002 r7:60000113 r6:ecf2dd8c r5:858e9800 r4:858e9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05980 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f137000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1f8c r4:859b1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858e9800 r8:85a1492c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:591:6497 blocked for more than 467 seconds. Call trace: [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd57000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b278c r4:859b2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b278c r4:85a14a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d3000 r8:85a14a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecf31fb0 to 0xecf31ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:592:6498 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:6498 tgid:6498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf35d84 r8:00000002 r7:60000113 r6:ecf35d8c r5:858f0000 r4:858f0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece75000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b2f8c r4:859b2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b2f8c r4:85a14b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f0000 r8:85a14b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14b00 r8:80287e08 r7:ecf31e60 r6:85a14b80 r5:858f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf35fb0 to 0xecf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a05a40 INFO: task kworker/0:592:6498 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:6499 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf39d84 r8:00000002 r7:60000113 r6:ecf39d8c r5:858f0c00 r4:858f0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf39e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:859b238c r4:85a14c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:6500 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:6500 tgid:6500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf3dd84 r8:00000002 r7:60000113 r6:ecf3dd8c r5:858f1800 r4:858f1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf3de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece87000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ca78c r4:859ca400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ca78c r4:85a14d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f1800 r8:85a14d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:595:6503 blocked for more than 467 seconds. Call trace: r4:858f2400 r5:858f2400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf29e08 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859e638c r4:859e6000 r4:85a14e00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:6507 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:6507 tgid:6507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf69d84 r8:00000002 r7:60010113 r6:ecf69d8c r5:858f3000 r4:858f3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a96c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f113000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b138c r4:859b1000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b138c r4:85a14f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f3000 r8:85a14f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a14f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a14f00 r8:80287e08 r7:ecf29e60 r6:85a14f80 r5:858f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf69fb0 to 0xecf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420acc0 INFO: task kworker/0:596:6507 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:6551 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:6551 tgid:6551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecffdd84 r8:00000002 r7:60000113 r6:ecffdd8c r5:858f6000 r4:858f6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a318c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f135000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece89000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b378c r4:859b3400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b378c r4:85a1c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f6000 r8:85a1c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c000 r8:80287e08 r7:ecf29e60 r6:85a1c080 r5:858f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecffdfb0 to 0xecffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a9140 INFO: task kworker/0:597:6551 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r5:80090113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:00000000 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:6556 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed011d84 r8:00000002 r7:60000113 r6:ed011d8c r5:85300000 r4:85300000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85300000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed011e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a31040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85300000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed007000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b0b8c r4:859b0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b0b8c r4:85a1c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300000 r8:85a1c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c100 r8:80287e08 r7:ecffde60 r6:85a1c180 r5:85300000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed011fb0 to 0xed011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a31140 INFO: task kworker/0:598:6556 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:6564 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:6564 tgid:6564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf81d84 r8:00000002 r7:60000113 r6:ecf81d8c r5:85302400 r4:85302400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85302400 r4:8291a680 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf25000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b2b8c r4:859b2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b2b8c r4:85a1c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85302400 r8:85a1c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c200 r8:80287e08 r7:ecffde60 r6:85a1c280 r5:85302400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf81fb0 to 0xecf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a31740 INFO: task kworker/0:599:6564 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:6567 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:6567 tgid:6567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed01dd84 r8:00000002 r7:60000013 r6:ed01dd8c r5:85301800 r4:85301800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85301800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed01de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5340 r4:00000000 r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 r5:84791f8c r4:84791c00 r10:61c88647 r9:85301800 r8:85a1c32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed01dfb0 to 0xed01dff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:6570 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:6570 tgid:6570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed025d84 r8:00000002 r7:60000113 r6:ed025d8c r5:85300c00 r4:85300c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85300c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed025e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ff440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85300c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab3b8c r4:85ab3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ab3b8c r4:85a1c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300c00 r8:85a1c42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c400 r8:80287e08 r7:ed01de60 r6:85a1c480 r5:85300c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed025fb0 to 0xed025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a31ac0 INFO: task kworker/0:601:6570 is blocked on a mutex likely owned by task kworker/0:12:3148. r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8334b7c0 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ed141d84 r8:00000002 r7:60000113 r6:ed141d8c r5:85306000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84790f8c r4:84790c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84790f8c r4:85a1c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306000 r8:85a1c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c500 r8:80287e08 r7:ed01de60 r6:85a1c580 r5:85306000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed141fb0 to 0xed141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a08500 INFO: task kworker/0:602:6614 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85306c00 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a1c600 Exception stack(0xed1e1fb0 to 0xed1e1ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80090113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85303c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21d000 r7:dddced80 r6:83018000 r5:8479038c r4:85a1c700 r10:00000000 r9:85a1c700 r8:80287e08 r7:ed1e1e60 r6:85a1c780 r5:85303c00 r4:859b5480 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:6682 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:6682 tgid:6682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1e5d84 r8:00000002 r7:60000013 r6:ed1e5d8c r5:85305400 r4:85305400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85305400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f221000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479138c r4:84791000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479138c r4:85a1c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85305400 r8:85a1c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1c800 r8:80287e08 r7:ed1e1e60 r6:85a1c880 r5:85305400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b5440 INFO: task kworker/0:605:6682 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6684 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:6684 tgid:6684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1edd84 r8:00000002 r7:60000113 r6:ed1edd8c r5:85304800 r4:85304800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85304800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85304800 r7:00000000 r6:83018000 r5:00001000 r4:7f223000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc93000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580878c r4:85808400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580878c r4:85a1c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85304800 r8:85a1c92c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85a1c900 r8:80287e08 r7:ed1e5e60 r6:85a1c980 r5:85304800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1edfb0 to 0xed1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b57c0 INFO: task kworker/0:606:6684 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:607:6686 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:6686 tgid:6686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f1d84 r8:00000002 r7:60000013 r6:ed1f1d8c r5:85303000 r4:85303000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85303000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5b80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:857f838c r4:857f8000 r7:dddced80 r6:83018000 r5:857f838c r4:85a1ca00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:6688 tgid:6688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f5d84 r8:00000002 r7:60000013 r6:ed1f5d8c r5:84928000 r4:84928000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84928000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5d00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f227000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f8b8c r4:857f8800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f8b8c r4:85a1cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84928000 r8:85a1cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1cb00 r8:80287e08 r7:ed1f1e60 r6:85a1cb80 r5:84928000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:859b5b40 INFO: task kworker/0:608:6688 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:609 state:D stack:0 pid:6690 tgid:6690 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b5e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f938c r4:857f9000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f938c r4:85a1cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84928c00 r8:85a1cc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1cc00 r8:80287e08 r7:ed1f5e60 r6:85a1cc80 r5:84928c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1f9fb0 to 0xed1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b5cc0 INFO: task kworker/0:609:6690 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:610:6692 blocked for more than 467 seconds. r10:8291a684 r9:ed1fdd84 r8:00000002 r7:60000113 r6:ed1fdd8c r5:84929800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b53c0 r5:857f8f8c r4:857f8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f8f8c r4:85a1cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84929800 r8:85a1cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1cd00 r8:80287e08 r7:ed1f9e60 r6:85a1cd80 r5:84929800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1fdfb0 to 0xed1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b5e40 INFO: task kworker/0:610:6692 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:611 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857f9f8c r4:857f9c00 r4:85a1ce00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed201fb0 to 0xed201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f7c0 INFO: task kworker/0:611:6695 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:6696 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:6696 tgid:6696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8492b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed205e08 r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f22d000 r5:857f9b8c r4:857f9800 r10:61c88647 r9:8492b000 r8:8584272c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:85a3c800 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f231000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf93000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fa38c r4:857fa000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fa38c r4:847aa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a3c800 r8:847aa02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa000 r8:80287e08 r7:ed201e60 r6:85a0d480 r5:85a3c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed215fb0 to 0xed215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c7100 INFO: task kworker/0:613:6699 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:614 state:D stack:0 pid:6700 tgid:6700 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85a39800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed219e08 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857faf8c r4:847aa080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:6701 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:6701 tgid:6701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed21dd84 r8:00000002 r7:60000013 r6:ed21dd8c r5:85a3d400 r4:85a3d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a3d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c7280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f233000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f878c r4:857f8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f878c r4:847aa100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a3d400 r8:847aa12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa100 r8:80287e08 r7:ed219e60 r6:85a0d400 r5:85a3d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed21dfb0 to 0xed21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c70c0 INFO: task kworker/0:615:6701 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:6704 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:6704 tgid:6704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed209d84 r8:00000002 r7:60000113 r6:ed209d8c r5:85a3a400 r4:85a3a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a3a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a3a400 r8:847aa1ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:852c7380 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:6709 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:6709 tgid:6709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed211d84 r8:00000002 r7:60000013 r6:ed211d8c r5:85a38c00 r4:85a38c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a38c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c79c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f23f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fbb8c r4:857fb800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fbb8c r4:847aa200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a38c00 r8:847aa22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa200 r8:80287e08 r7:ed209e60 r6:85a0d600 r5:85a38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed211fb0 to 0xed211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c76c0 INFO: task kworker/0:617:6709 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:6712 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:6712 tgid:6712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed22dd84 r8:00000002 r7:60000113 r6:ed22dd8c r5:85a38000 r4:85a38000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a38000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a38000 r8:847aa2ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:6713 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:6713 tgid:6713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed231d84 r8:00000002 r7:60000113 r6:ed231d8c r5:85a3e000 r4:85a3e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a3e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed231e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c7c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a3e000 r7:00000000 r6:83018000 r5:00001000 r4:7f243000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593a78c r4:8593a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8593a78c r4:847aa300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a3e000 r8:847aa32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa300 r8:80287e08 r7:ed22de60 r6:85a0d700 r5:85a3e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:620 state:D stack:0 pid:6715 tgid:6715 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c7e00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f245000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0ef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84790b8c r4:84790800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84790b8c r4:847aa380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a3ec00 r8:847aa3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa380 r8:80287e08 r7:ed231e60 r6:85a0d780 r5:85a3ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed239fb0 to 0xed239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c7bc0 INFO: task kworker/0:620:6715 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:00000000 r5:8529a38c r4:8529a000 r4:849f1580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a21300 r5:859a178c r4:859a1400 r4:847aa400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:858f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 r10:61c88647 r9:858f3c00 r8:847aa4ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:6720 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:6720 tgid:6720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed24dd84 r8:00000002 r7:60000013 r6:ed24dd8c r5:858f6c00 r4:858f6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858f6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed24de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c7fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:858f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f249000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed111000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a0b8c r4:859a0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a0b8c r4:847aa500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858f6c00 r8:847aa52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa500 r8:80287e08 r7:ed241e60 r6:85a0d900 r5:858f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed24dfb0 to 0xed24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c7f80 INFO: task kworker/0:623:6720 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 80b2d000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:00001000 r4:ed157000 r5:859a078c r4:859a0400 r10:61c88647 r9:85a3b000 r8:847aa5ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a3bc00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847aa600 Exception stack(0xed259fb0 to 0xed259ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b5f40 INFO: task kworker/0:625:6725 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:6727 blocked for more than 467 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:6727 tgid:6727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed25dd84 r8:00000002 r7:60000113 r6:ed25dd8c r5:858f4800 r4:858f4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:858f4800 r8:847aa6ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a217c0 r9:83018005 r8:851f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f257000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed27d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a278c r4:859a2400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a278c r4:847aa700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f6000 r8:847aa72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa700 r8:80287e08 r7:ed241e60 r6:85a0db00 r5:851f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed269fb0 to 0xed269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a212c0 INFO: task kworker/0:627:6729 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f253000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed261000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a1f8c r4:859a1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a1f8c r4:847aa800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8000 r8:847aa82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aa800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa800 r8:80287e08 r7:ed269e60 r6:85a0db80 r5:853d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed271fb0 to 0xed271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a21180 INFO: task kworker/0:628:6730 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859a238c r4:859a2000 r10:61c88647 r9:8492d400 r8:847aa7ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r5:80090113 r4:80239bb0 r4:df9dddc0 r5:00001000 r4:dffe3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:630 state:D stack:0 pid:6735 tgid:6735 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847aa900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aa900 r8:80287e08 r7:ed269e60 r6:847aa980 r5:8492e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed275fb0 to 0xed275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a21780 INFO: task kworker/0:630:6735 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:6736 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:6736 tgid:6736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1e9d84 r8:00000002 r7:60000113 r6:ed1e9d8c r5:8492ec00 r4:8492ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a21940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:859a2b8c r4:847aaa00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f213000 r10:61c88647 r9:8492c800 r8:847aab2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r5:80090113 r4:80239bb0 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:6741 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:6741 tgid:6741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed299d84 r8:00000002 r7:60000013 r6:ed299d8c r5:8492bc00 r4:8492bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed299e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a219c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f25b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a1b8c r4:859a1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a1b8c r4:847aac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492bc00 r8:847aac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aac00 r8:80287e08 r7:ed289e60 r6:847aac80 r5:8492bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed299fb0 to 0xed299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:859a3b8c r4:847aad00 r4:847aad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aad00 r8:80287e08 r7:ed299e60 r6:847aad80 r5:85900000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed29dfb0 to 0xed29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a21a80 INFO: task kworker/0:634:6743 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:6746 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:635 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9d080 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847aae00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:6747 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:6747 tgid:6747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2b1d84 r8:00000002 r7:60000113 r6:ed2b1d8c r5:85901800 r4:85901800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85901800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c70c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85901800 r7:00000000 r6:83018000 r5:00001000 r4:7f25f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a3f8c r4:859a3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859a3f8c r4:847aaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85901800 r8:847aaf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847aaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aaf00 r8:80287e08 r7:ed2a9e60 r6:847aaf80 r5:85901800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2b1fb0 to 0xed2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 task:kworker/0:637 state:D stack:0 pid:6749 tgid:6749 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:638:6751 blocked for more than 468 seconds. r10:8291a684 r9:ed2d1d84 r8:00000002 r7:60000113 r6:ed2d1d8c r5:85903c00 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed2d7000 r5:85a4078c r4:85a40400 r4:85aa0100 Exception stack(0xed2d1fb0 to 0xed2d1ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:639:6753 blocked for more than 468 seconds. r5:85905400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9d4c0 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85aa0200 r8:80287e08 r7:ed2d1e60 r6:85aa0280 r5:85905400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:6755 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:6755 tgid:6755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2c5d84 r8:00000002 r7:60000113 r6:ed2c5d8c r5:85902400 r4:85902400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85902400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9d6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85902400 r7:00000000 r6:83018000 r5:00001000 r4:7f269000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2dd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4038c r4:85a40000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4038c r4:85aa0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85902400 r8:85aa032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0300 r8:80287e08 r7:ed2d1e60 r6:85aa0380 r5:85902400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9d6c0 INFO: task kworker/0:640:6755 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:641:6757 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:6757 tgid:6757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2e1d84 r8:00000002 r7:60000113 r6:ed2e1d8c r5:85906000 r4:85906000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85aa0400 r8:80287e08 r7:ed2c5e60 r6:85aa0480 r5:85906000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85a9d480 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85908000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9de80 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:6765 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:6765 tgid:6765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed309d84 r8:00000002 r7:60000113 r6:ed309d8c r5:85908c00 r4:85908c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85908c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed309e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d2c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85908c00 r7:00000000 r6:83018000 r5:00001000 r4:7f277000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed327000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a42f8c r4:85a42c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a42f8c r4:85aa0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85908c00 r8:85aa082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0800 r8:80287e08 r7:ed2fde60 r6:85aa0880 r5:85908c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed309fb0 to 0xed309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9de40 INFO: task kworker/0:645:6765 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 task:kworker/0:647 state:D stack:0 pid:6769 tgid:6769 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed31de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8590a400 r7:00000000 r6:83018000 r5:00001000 r4:7f275000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed319000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4278c r4:85a42400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4278c r4:85aa0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590a400 r8:85aa0a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0a00 r8:80287e08 r7:ed309e60 r6:85aa0a80 r5:8590a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed31dfb0 to 0xed31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598d100 INFO: task kworker/0:647:6769 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8590b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d4c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8590b000 r7:00000000 r6:83018000 r5:00001000 r4:7f279000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed32d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a40f8c r4:85a40c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a40f8c r4:85aa0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590b000 r8:85aa0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0b00 r8:80287e08 r7:ed309e60 r6:85aa0b80 r5:8590b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed325fb0 to 0xed325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598d280 INFO: task kworker/0:648:6771 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8590bc00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85aa0c00 Exception stack(0xed331fb0 to 0xed331ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d7c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8590c800 r7:00000000 r6:83018000 r5:00001000 r4:7f27d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed341000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4378c r4:85a43400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4378c r4:85aa0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590c800 r8:85aa0d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0d00 r8:80287e08 r7:ed331e60 r6:85aa0d80 r5:8590c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed339fb0 to 0xed339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598d1c0 INFO: task kworker/0:650:6775 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:6777 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:6777 tgid:6777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed345d84 r8:00000002 r7:60000113 r6:ed345d8c r5:8590d400 r4:8590d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8590d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed345e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d1c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8590d400 r7:00000000 r6:83018000 r5:00001000 r4:7f27f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed34f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4338c r4:85a43000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4338c r4:85aa0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8590d400 r8:85aa0e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85aa0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0e00 r8:80287e08 r7:ed339e60 r6:85aa0e80 r5:8590d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:6780 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:6780 tgid:6780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:ed34dd84 r8:00000002 r7:60000113 r6:ed34dd8c r5:8590e000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed355000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85aa0f00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:653 state:D stack:0 pid:6781 tgid:6781 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598d780 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:654:6783 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:6783 tgid:6783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed361d84 r8:00000002 r7:60000113 r6:ed361d8c r5:854b8000 r4:854b8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed361e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598ddc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed369000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4c38c r4:85a4c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4c38c r4:8599b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b8000 r8:8599b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b000 r8:80287e08 r7:ed359e60 r6:8599b080 r5:854b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed361fb0 to 0xed361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598d6c0 INFO: task kworker/0:654:6783 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6785 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6785 tgid:6785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed36dd84 r8:00000002 r7:60000113 r6:ed36dd8c r5:854b8c00 r4:854b8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9df80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f289000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed37d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4d38c r4:85a4d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4d38c r4:8599b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b8c00 r8:8599b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b100 r8:80287e08 r7:ed361e60 r6:8599b180 r5:854b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed36dfb0 to 0xed36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598dd80 INFO: task kworker/0:655:6785 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:656 state:D stack:0 pid:6787 tgid:6787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4cb8c r4:85a4c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4cb8c r4:8599b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b9800 r8:8599b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b200 r8:80287e08 r7:ed36de60 r6:8599b280 r5:854b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed375fb0 to 0xed375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9de40 INFO: task kworker/0:656:6787 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:657 state:D stack:0 pid:6789 tgid:6789 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854ba400 r8:8599b32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85b03300 INFO: task kworker/0:658:6792 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6793 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:6793 tgid:6793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed395d84 r8:00000002 r7:60000113 r6:ed395d8c r5:854bbc00 r4:854bbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854bbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed395e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b03440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f28f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed39f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4df8c r4:85a4dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4df8c r4:8599b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bbc00 r8:8599b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b500 r8:80287e08 r7:ed389e60 r6:8599b580 r5:854bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed395fb0 to 0xed395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b031c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 r5:00001000 r4:dffe3000 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:660:6795 blocked for more than 468 seconds. r5:854bc800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b030c0 INFO: task kworker/0:660:6795 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:6797 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:6797 tgid:6797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3a9d84 r8:00000002 r7:60000113 r6:ed3a9d8c r5:854bd400 r4:854bd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854bd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b03740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f293000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4e78c r4:85a4e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4e78c r4:8599b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bd400 r8:8599b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b700 r8:80287e08 r7:ed39de60 r6:8599b780 r5:854bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a9fb0 to 0xed3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b03600 INFO: task kworker/0:661:6797 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b03b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f29b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4d78c r4:85a4d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4d78c r4:8599b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854bec00 r8:8599b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599b800 r8:80287e08 r7:ed3a9e60 r6:8599b880 r5:854bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3bdfb0 to 0xed3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b030c0 INFO: task kworker/0:662:6798 is blocked on a mutex likely owned by task kworker/0:12:3148. Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6804 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6804 tgid:6804 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:85a4f38c r4:85a4f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b48c00 r8:8599baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599ba80 r8:80287e08 r7:ed3bde60 r6:8599b900 r5:85b48c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d1fb0 to 0xed3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b03ac0 INFO: task kworker/0:663:6804 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r5:80090113 r4:80239bb0 r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:6808 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r5:85b4a400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed3e9000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:666:6810 blocked for more than 468 seconds. r10:8291a684 r9:ed3edd84 r8:00000002 r7:60000113 r6:ed3edd8c r5:85b4b000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:6812 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:6812 tgid:6812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed401d84 r8:00000002 r7:60000013 r6:ed401d8c r5:85b4c800 r4:85b4c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b4c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed401e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b03e00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4cf8c r4:85a4cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4cf8c r4:8599bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b4c800 r8:8599bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599bd00 r8:80287e08 r7:ed3ede60 r6:8599bd80 r5:85b4c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed401fb0 to 0xed401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b03940 INFO: task kworker/0:667:6812 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:668 state:D stack:0 pid:6813 tgid:6813 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed405fb0 to 0xed405ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:6818 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:670 state:D stack:0 pid:6818 tgid:6818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed41dd84 r8:00000002 r7:60000113 r6:ed41dd8c r5:853dc800 r4:853dc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed41de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0c680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed41f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a43b8c r4:85a43800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a43b8c r4:85b11000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dc800 r8:85b1102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:6820 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0c7c0 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5838c r4:85a58000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5838c r4:85b11080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dd400 r8:85b110ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11080 r8:80287e08 r7:ed41de60 r6:85a0dd80 r5:853dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed429fb0 to 0xed429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c5c0 INFO: task kworker/0:671:6820 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:853db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed445e08 r5:00001000 r4:ed43d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed445fb0 to 0xed445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c980 INFO: task kworker/0:673:6824 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6826 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed451d84 r8:00000002 r7:60000113 r6:ed451d8c r5:853d9800 r4:853d9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853d9800 r8:85b1122c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0cc40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:853da400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed453000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5978c r4:85a59400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5978c r4:85b11400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853da400 r8:85b1142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11400 r8:80287e08 r7:ed451e60 r6:85a0df80 r5:853da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed45dfb0 to 0xed45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c980 INFO: task kworker/0:675:6827 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ed465d84 r8:00000002 r7:60000113 r6:ed465d8c r5:85a78000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:6832 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:6832 tgid:6832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed47dd84 r8:00000002 r7:60000113 r6:ed47dd8c r5:85a7a400 r4:85a7a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a7a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed47de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b20740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a7a400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5bb8c r4:85a5b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5bb8c r4:85b11300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a7a400 r8:85b1132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df9dddc0 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0cf00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed475000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a59f8c r4:85a59c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a59f8c r4:85b11380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a78c00 r8:85b113ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11380 r8:80287e08 r7:ed47de60 r6:85b1d100 r5:85a78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed485fb0 to 0xed485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c640 INFO: task kworker/0:678:6833 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:679:6835 blocked for more than 468 seconds. [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:85a5a78c r4:85a5a400 r7:dddced80 r6:83018000 r5:85a5a78c r4:85b11480 Exception stack(0xed495fb0 to 0xed495ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b20080 INFO: task kworker/0:679:6835 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:680:6838 blocked for more than 468 seconds. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b20240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f2bd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed491000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5ab8c r4:85a5a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5ab8c r4:85b11500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a7b000 r8:85b1152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11500 r8:80287e08 r7:ed47de60 r6:85b1d200 r5:85a7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4a5fb0 to 0xed4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:6840 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4b5d84 r8:00000002 r7:60000113 r6:ed4b5d8c r5:85a7c800 r4:85a7c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a7c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b20440 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85a7c800 r8:85b115ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed26dd84 r8:00000002 r7:60000113 r6:ed26dd8c r5:85a79800 r4:85a79800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a79800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed26de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b20580 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a79800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5b38c r4:85a5b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:683 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b20900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f215000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec889000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a4eb8c r4:85a4e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a4eb8c r4:85b11680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a7ec00 r8:85b116ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11680 r8:80287e08 r7:ed47de60 r6:85b1d400 r5:85a7ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4b9fb0 to 0xed4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b20300 INFO: task kworker/0:683:6846 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81302000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a7e000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b208c0 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6849 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6849 tgid:6849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4c1d84 r8:00000002 r7:60000013 r6:ed4c1d8c r5:851f6c00 r4:851f6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851f6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599e040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:851f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f28b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5a38c r4:85a5a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5a38c r4:85b11780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851f6c00 r8:85b117ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11780 r8:80287e08 r7:ed4bde60 r6:85b1d500 r5:851f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c1fb0 to 0xed4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:85b209c0 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a90000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a90000 r8:85b1182c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a90c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f289000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3fb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5878c r4:85a58400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5878c r4:85b11880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a90c00 r8:85b118ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11880 r8:80287e08 r7:ed4c1e60 r6:85b1d600 r5:85a90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed281fb0 to 0xed281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8599e540 INFO: task kworker/0:687:6885 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:6922 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:6922 tgid:6922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5b9d84 r8:00000002 r7:60000013 r6:ed5b9d8c r5:85a94800 r4:85a94800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a94800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578a780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85b11900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 task:kworker/0:689 state:D stack:0 pid:6924 tgid:6924 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5bde08 r5:00001000 r4:ecb0f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479178c r4:85b11980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a95400 r8:85b119ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11980 r8:80287e08 r7:ed5b9e60 r6:85b1d700 r5:85a95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5bdfb0 to 0xed5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8599eb40 INFO: task kworker/0:689:6924 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:6937 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:6937 tgid:6937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5a1d84 r8:00000002 r7:60000013 r6:ed5a1d8c r5:85a96000 r4:85a96000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a96000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578a9c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f251000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf21000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5c78c r4:85a5c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed5a1fb0 to 0xed5a1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:6941 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:6941 tgid:6941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4add84 r8:00000002 r7:60000113 r6:ed4add8c r5:85a96c00 r5:85a96c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578abc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf77000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5cf8c r4:85a5cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5cf8c r4:85b11a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a96c00 r8:85b11aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11a80 r8:80287e08 r7:ed5a1e60 r6:85b1d800 r5:85a96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4adfb0 to 0xed4adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:6942 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:6942 tgid:6942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed575d84 r8:00000002 r7:60000113 r6:ed575d8c r5:85a92400 r4:85a92400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a92400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed575e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a56c0 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a92400 r8:85b11b2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:849f1580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5d78c r4:85a5d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5d78c r4:85b11b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a93c00 r8:85b11bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11b80 r8:80287e08 r7:ed575e60 r6:85b1d900 r5:85a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5ddfb0 to 0xed5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8578aac0 INFO: task kworker/0:693:6943 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:6945 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:6945 tgid:6945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5e5d84 r8:00000002 r7:60000013 r6:ed5e5d8c r5:85a93000 r4:85a93000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a93000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5e5e08 r9:83018005 r8:85a93000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 r7:dddced80 r6:83018000 r5:85a5cb8c r4:85b11c00 r10:00000000 r9:85b11c00 r8:80287e08 r7:ed575e60 r6:85b1d980 r5:85a93000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85a7d400 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578af40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a7d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed073000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5c38c r4:85a5c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5c38c r4:85b11c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a7d400 r8:85b11cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11c80 r8:80287e08 r7:ed575e60 r6:85b1da00 r5:85a7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5edfb0 to 0xed5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8578af00 INFO: task kworker/0:695:6947 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:6950 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:6950 tgid:6950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5f9d84 r8:00000002 r7:60000113 r6:ed5f9d8c r5:85a88c00 r4:85a88c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f9e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85a5df8c r4:85b11d00 r10:00000000 r9:85b11d00 r8:80287e08 r7:ed575e60 r6:85b1da80 r5:85a88c00 r4:8578aec0 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:6951 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:6951 tgid:6951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5fdd84 r8:00000002 r7:60000013 r6:ed5fdd8c r5:85a89800 r4:85a89800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a89800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a89800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5e38c r4:85a5e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5e38c r4:85b11d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a89800 r8:85b11dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11d80 r8:80287e08 r7:ed575e60 r6:85b1db00 r5:85a89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5fdfb0 to 0xed5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed605e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:6955 blocked for more than 468 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:6955 tgid:6955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed60dd84 r8:00000002 r7:60000113 r6:ed60dd8c r5:85a8a400 r4:85a8a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a8a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed60de08 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85a8a400 r8:85b11eac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dffe3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85a8c800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5500 r7:dddced80 r6:83018000 r5:85a5eb8c r4:8599bf00 r10:00000000 r9:8599bf00 r8:80287e08 r7:ed575e60 r6:85b1dc80 r5:85a8c800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:6960 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:6960 tgid:6960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed621d84 r8:00000002 r7:60000113 r6:ed621d8c r5:85a8bc00 r4:85a8bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a8bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed621e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed235000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a5d38c r4:85a5d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a5d38c r4:8599bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a8bc00 r8:8599bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8599bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8599bf80 r8:80287e08 r7:ed575e60 r6:85b1dd00 r5:85a8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed621fb0 to 0xed621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5680 INFO: task kworker/0:701:6960 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:702 state:D stack:0 pid:6963 tgid:6963 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed62de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5fb8c r4:85a5f800 r10:61c88647 r9:85a8ec00 r8:85a3602c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:ed635d84 r8:00000002 r7:60000013 r6:ed635d8c r5:85a91800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f2bb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed279000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbc38c r4:85bbc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbc38c r4:85a36080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a91800 r8:85a360ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36080 r8:80287e08 r7:ed62de60 r6:85b1de00 r5:85a91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed635fb0 to 0xed635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5600 INFO: task kworker/0:703:6965 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85a8e000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed639e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed639fb0 to 0xed639ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dffe3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85bbcb8c r4:85bbc800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbcb8c r4:85a36180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a88000 r8:85a361ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36180 r8:80287e08 r7:ed639e60 r6:85b1df00 r5:85a88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed63dfb0 to 0xed63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5bc0 INFO: task kworker/0:705:6967 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:6969 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:6969 tgid:6969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed645d84 r8:00000002 r7:60000113 r6:ed645d8c r5:85a8d400 r4:85a8d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a8d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed645e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85a8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2bf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4af000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbd38c r4:85bbd000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbd38c r4:85a36200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a8d400 r8:85a3622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36200 r8:80287e08 r7:ed639e60 r6:85b1df80 r5:85a8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed645fb0 to 0xed645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5c40 INFO: task kworker/0:706:6969 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:707:6971 blocked for more than 469 seconds. r4:85af0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed64de08 r9:83018005 r8:85af0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2df000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5e40 INFO: task kworker/0:707:6971 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:708:6973 blocked for more than 469 seconds. r4:85af2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r9:83018005 r8:85af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f2e1000 r5:85bbcf8c r4:85bbcc00 r4:85a36300 Exception stack(0xed655fb0 to 0xed655ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:709:6975 blocked for more than 469 seconds. r4:85af0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed65de08 r5:00001000 r4:ed521000 r7:dddced80 r6:83018000 r5:85bbdb8c r4:85a36380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:6978 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:6978 tgid:6978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed669d84 r8:00000002 r7:60000113 r6:ed669d8c r5:85af3000 r4:85af3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed669e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578afc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af3000 r7:00000000 r6:83018000 r5:00001000 r4:7f2e5000 r5:85bbe38c r4:85bbe000 r10:61c88647 r9:85af3000 r8:85a3642c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:6979 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:6979 tgid:6979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed66dd84 r8:00000002 r7:60000113 r6:ed66dd8c r5:85af1800 r4:85af1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5c40 r5:00001000 r4:ed537000 r5:85bbc78c r4:85bbc400 r10:61c88647 r9:85af1800 r8:85a364ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:6981 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:6981 tgid:6981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed675d84 r8:00000002 r7:60000013 r6:ed675d8c r5:85af3c00 r4:85af3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2ef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed57d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbf38c r4:85bbf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbf38c r4:85a36500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af3c00 r8:85a3652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36500 r8:80287e08 r7:ed639e60 r6:85992200 r5:85af3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a5980 INFO: task kworker/0:712:6981 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b240 r5:85bbeb8c r4:85bbe800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:6987 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:6987 tgid:6987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed67dd84 r8:00000002 r7:60000113 r6:ed67dd8c r5:85b4bc00 r4:85b4bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b4bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed67de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b8c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f2f5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed597000 r5:85bbff8c r4:85bbfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a36680 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:715 state:D stack:0 pid:6989 tgid:6989 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed221e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85b4d400 r8:85a367ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:6990 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:716 state:D stack:0 pid:6990 tgid:6990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed681d84 r8:00000002 r7:60000113 r6:ed681d8c r5:85af6000 r4:85af6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed681e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598b6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2f3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed58f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbf78c r4:85bbf400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbf78c r4:85a36880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af6000 r8:85a368ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36880 r8:80287e08 r7:ed67de60 r6:85992280 r5:85af6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed681fb0 to 0xed681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598b7c0 INFO: task kworker/0:716:6990 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:6994 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:6994 tgid:6994 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f303000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6e3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc578c r4:85bc5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc578c r4:85a36900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af6c00 r8:85a3692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36900 r8:80287e08 r7:ed67de60 r6:85992300 r5:85af6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed699fb0 to 0xed699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598b880 INFO: task kworker/0:717:6994 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:00001000 r4:dffe3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:718:6995 blocked for more than 469 seconds. r4:853de000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed69de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed69dfb0 to 0xed69dff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f2f9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598b780 INFO: task kworker/0:719:6996 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:6998 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:6998 tgid:6998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed6b5d84 r8:00000002 r7:60000013 r6:ed6b5d8c r5:85af8c00 r4:85af8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598bc80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2fb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbfb8c r4:85bbf800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbfb8c r4:85a36a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af8c00 r8:85a36aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36a80 r8:80287e08 r7:ed699e60 r6:85992480 r5:85af8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b5fb0 to 0xed6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598b7c0 INFO: task kworker/0:720:6998 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:721:7001 blocked for more than 469 seconds. r4:85afa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c5e08 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598bdc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85afa400 r7:00000000 r6:83018000 r5:00001000 r4:7f2fd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6b1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc438c r4:85bc4000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc438c r4:85a36b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85afa400 r8:85a36b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36b00 r8:80287e08 r7:ed699e60 r6:85992500 r5:85afa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598bd40 INFO: task kworker/0:721:7001 is blocked on a mutex likely owned by task kworker/0:12:3148. Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85af9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8598bf00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ff000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6c7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc4b8c r4:85bc4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc4b8c r4:85a36b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af9800 r8:85a36bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36b80 r8:80287e08 r7:ed699e60 r6:85992580 r5:85af9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d5fb0 to 0xed6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80090113 ffffffff [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:723 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e1e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85bc538c r4:85bc5000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc538c r4:85a36c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85afbc00 r8:85a36c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36c00 r8:80287e08 r7:ed699e60 r6:85992600 r5:85afbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8598bfc0 INFO: task kworker/0:723:7005 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:724:7007 blocked for more than 469 seconds. r4:85af8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f5e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1b300 INFO: task kworker/0:724:7007 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:7009 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:725 state:D stack:0 pid:7009 tgid:7009 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1b440 r5:85bc5f8c r4:85bc5c00 r10:61c88647 r9:85afc800 r8:85a36d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:726 state:D stack:0 pid:7011 tgid:7011 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed71b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc678c r4:85a36d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85afe000 r8:85a36dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36d80 r8:80287e08 r7:ed705e60 r6:85992780 r5:85afe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1b2c0 INFO: task kworker/0:726:7011 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85afec00 r4:8291a680 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85bc638c r4:85bc6000 r7:dddced80 r6:83018000 r5:85bc638c r4:85a36e00 r10:00000000 r9:85a36e00 r8:80287e08 r7:ed711e60 r6:85992800 r5:85afec00 INFO: task kworker/0:727:7013 is blocked on a mutex likely owned by task kworker/0:12:3148. Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:728 state:D stack:0 pid:7018 tgid:7018 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed729e08 r5:00001000 r4:df96d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:7019 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:7019 tgid:7019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed731d84 r8:00000002 r7:60000013 r6:ed731d8c r5:85bf8000 r4:85bf8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bf8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed731e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987e40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85bf8000 r7:00000000 r6:83018000 r5:00001000 r4:7f345000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc8f8c r4:85bc8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc8f8c r4:85a36f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bf8000 r8:85a36f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a36f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a36f00 r8:80287e08 r7:ed729e60 r6:85992900 r5:85bf8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed731fb0 to 0xed731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1b500 INFO: task kworker/0:729:7019 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:730:7021 blocked for more than 469 seconds. r5:85bf8c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed735e08 r5:00001000 r4:ed49d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed739e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859873c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85bf9800 r7:00000000 r6:83018000 r5:00001000 r4:7f307000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc7b8c r4:85bc7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc7b8c r4:85b31000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bf9800 r8:85b3102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31000 r8:80287e08 r7:ed731e60 r6:85992a00 r5:85bf9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed739fb0 to 0xed739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1b980 INFO: task kworker/0:731:7042 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:733 state:D stack:0 pid:7088 tgid:7088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed761d84 r8:00000002 r7:60000013 r6:ed761d8c r5:85bfa400 r4:85bfa400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bfa400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed761e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859875c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85bfa400 r7:00000000 r6:83018000 r5:00001000 r4:7f30b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc6b8c r4:85bc6800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc6b8c r4:85b31280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfa400 r8:85b312ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31280 r8:80287e08 r7:ed731e60 r6:85992b00 r5:85bfa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed761fb0 to 0xed761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85987540 INFO: task kworker/0:733:7088 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:7092 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:7092 tgid:7092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed771d84 r8:00000002 r7:60000013 r6:ed771d8c r5:85bfe000 r4:85bfe000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bfe000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed771e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85bc738c r4:85bc7000 r10:61c88647 r9:85bfe000 r8:85b311ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85bfb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed779e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859879c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f33d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed123000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbef8c r4:85bbec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bbef8c r4:85b31200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfb000 r8:85b3122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31200 r8:80287e08 r7:ed731e60 r6:85992c80 r5:85bfb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed779fb0 to 0xed779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85987600 INFO: task kworker/0:736:7094 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84792b8c r4:84792800 r10:61c88647 r9:85bfec00 r8:85b3132c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:7098 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:738 state:D stack:0 pid:7098 tgid:7098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed789d84 r8:00000002 r7:60000013 r6:ed789d8c r5:85af4800 r4:85af4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85af4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed789e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987c00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85af4800 r7:00000000 r6:83018000 r5:00001000 r4:7f341000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed229000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc838c r4:85bc8000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc838c r4:85b31380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85af4800 r8:85b313ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31380 r8:80287e08 r7:ed731e60 r6:85992d80 r5:85af4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed789fb0 to 0xed789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85987a80 INFO: task kworker/0:738:7098 is blocked on a mutex likely owned by task kworker/0:12:3148. r4:00000000 r5:80090113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85afb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed78de08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85afb000 r8:85b3142c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85c00c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed795e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed30d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc9b8c r4:85bc9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc9b8c r4:85b31480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c00c00 r8:85b314ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31480 r8:80287e08 r7:ed731e60 r6:85992e80 r5:85c00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed795fb0 to 0xed795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85987e00 INFO: task kworker/0:740:7103 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:7104 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:7104 tgid:7104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed799d84 r8:00000002 r7:60000113 r6:ed799d8c r5:85c01800 r4:85c01800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c01800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed799e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987f80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c01800 r7:00000000 r6:83018000 r5:00001000 r4:7f347000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ef000 r5:85bc878c r4:85bc8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8529a38c r4:8529a000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r4:85b4e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed709e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85b31580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:743:7108 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:743 state:D stack:0 pid:7108 tgid:7108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7a1d84 r8:00000002 r7:60000113 r6:ed7a1d8c r5:85b4ec00 r4:85b4ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b4ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7a1e08 r4:00000000 r5:85bc978c r4:85bc9400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b31680 r8:80287e08 r7:ed709e60 r6:85b31700 r5:85b4ec00 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:744:7112 blocked for more than 469 seconds. r5:85bfbc00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcab8c r4:85bca800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcab8c r4:85b31780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfbc00 r8:85b317ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31780 r8:80287e08 r7:ed7a1e60 r6:85b31800 r5:85bfbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7a5fb0 to 0xed7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b29200 INFO: task kworker/0:744:7112 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81831000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:745:7114 blocked for more than 469 seconds. r4:854be000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7a9e08 r9:83018005 r8:854be000 r7:00000000 r6:83018000 r5:00001000 r4:7f351000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:7116 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:7116 tgid:7116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7b5d84 r8:00000002 r7:60000013 r6:ed7b5d8c r5:85c00000 r4:85c00000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c00000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b296c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c00000 r7:00000000 r6:83018000 r5:00001000 r4:7f355000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcaf8c r4:85bcac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcaf8c r4:85b31980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c00000 r8:85b319ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31980 r8:80287e08 r7:ed7a5e60 r6:85b1e000 r5:85c00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:7118 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:747 state:D stack:0 pid:7118 tgid:7118 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7bde08 r5:00001000 r4:ed43f000 r5:85bcbf8c r4:85bcbc00 r10:61c88647 r9:85c03c00 r8:85b31a2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7bdfb0 to 0xed7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b29400 INFO: task kworker/0:747:7118 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:7119 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c1e08 r9:83018005 r8:85c02400 r7:00000000 r6:83018000 r5:00001000 r4:7f357000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:7121 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:7121 tgid:7121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7c9d84 r8:00000002 r7:60000113 r6:ed7c9d8c r5:85c03000 r4:85c03000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c03000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c03000 r7:00000000 r6:83018000 r5:00001000 r4:7f359000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bca38c r4:85bca000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bca38c r4:85b31b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c03000 r8:85b31b2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c9fb0 to 0xed7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b29700 INFO: task kworker/0:749:7121 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Not tainted 6.15.0-rc5-syzkaller #0 r5:84ab0c00 r4:8291a680 r4:00000000 r4:00000000 r5:85a5f78c r4:85a5f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:7126 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:7126 tgid:7126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84ab1800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ab1800 r8:85b31cac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:752:7129 blocked for more than 469 seconds. r5:84ab2400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8443ff8c r4:8443fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8443ff8c r4:85b31d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab2400 r8:85b31dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b31d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31d80 r8:80287e08 r7:ed7c5e60 r6:85b31e00 r5:84ab2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7cdfb0 to 0xed7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b29a00 INFO: task kworker/0:752:7129 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84ab3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d5e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84ab3c00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bcd78c r4:85bcd400 r10:61c88647 r9:84ab3c00 r8:85b31fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b420c0 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:7134 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:7134 tgid:7134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7ddd84 r8:00000002 r7:60000013 r6:ed7ddd8c r5:84ab4800 r4:84ab4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7dde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f365000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed523000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcc78c r4:85bcc400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcc78c r4:85b11f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab4800 r8:85b11fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b11f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b11f80 r8:80287e08 r7:ed7d9e60 r6:85b43000 r5:84ab4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7ddfb0 to 0xed7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b42000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:df9dddc0 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed539000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:7138 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7e5d84 r8:00000002 r7:60000113 r6:ed7e5d8c r5:84ab6c00 r4:84ab6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7e5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b424c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ab6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f369000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed55f000 r5:85bcd38c r4:85bcd000 r10:61c88647 r9:84ab6c00 r8:85b431ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:758 state:D stack:0 pid:7140 tgid:7140 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7e9e08 r9:83018005 r8:84ab5400 r7:00000000 r6:83018000 r5:00001000 r4:7f36b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85b43280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43280 r8:80287e08 r7:ed7d9e60 r6:85b43300 r5:84ab5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7e9fb0 to 0xed7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b425c0 INFO: task kworker/0:758:7140 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:7142 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:7142 tgid:7142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7edd84 r8:00000002 r7:60000013 r6:ed7edd8c r5:847d8c00 r4:847d8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847d8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847d8c00 r8:85b433ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85bce38c r4:85bce000 r10:61c88647 r9:847d9800 r8:85b434ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:7146 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:7146 tgid:7146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7f1d84 r8:00000002 r7:60000113 r6:ed7f1d8c r5:847da400 r4:847da400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847da400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42a00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847da400 r7:00000000 r6:83018000 r5:00001000 r4:7f373000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed629000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcc38c r4:85bcc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcc38c r4:85b43580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847da400 r8:85b435ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43580 r8:80287e08 r7:ed7e1e60 r6:85b43600 r5:847da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7f1fb0 to 0xed7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:7149 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:7149 tgid:7149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7f5d84 r8:00000002 r7:60000113 r6:ed7f5d8c r5:847db000 r4:847db000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847db000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847db000 r7:00000000 r6:83018000 r5:00001000 r4:7f375000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed647000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bceb8c r4:85bce800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bceb8c r4:85b43680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847db000 r8:85b436ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43680 r8:80287e08 r7:ed7f1e60 r6:85b43700 r5:847db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7f5fb0 to 0xed7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b42700 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed671000 r7:dddced80 r6:83018000 r5:85bcdf8c r4:85b43780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:7153 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:7153 tgid:7153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed7fdd84 r8:00000002 r7:60000113 r6:ed7fdd8c r5:847dc800 r4:847dc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7fde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c73040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f37b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcf38c r4:85bcf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcf38c r4:85b43880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b43880 r8:80287e08 r7:ed7f9e60 r6:85b43900 r5:847dc800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc5-syzkaller #0 r5:85c04800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85c04800 r8:85b43a2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed825e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847dd400 r8:85b43aac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:7165 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:7165 tgid:7165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed829d84 r8:00000002 r7:60000113 r6:ed829d8c r5:847dec00 r4:847dec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847dec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed829e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed665000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd938c r4:85bd9000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd938c r4:85b43b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847dec00 r8:85b43bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43b80 r8:80287e08 r7:ed825e60 r6:85b43c00 r5:847dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed829fb0 to 0xed829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c73000 INFO: task kworker/0:768:7165 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84ab0000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c736c0 r7:dddced80 r6:83018000 r5:85bd838c r4:85b43c80 r10:61c88647 r9:84ab0000 r8:85b43cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43c80 r8:80287e08 r7:ed829e60 r6:85b43d00 r5:84ab0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed831fb0 to 0xed831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c73600 INFO: task kworker/0:769:7167 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:7168 blocked for more than 469 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:7168 tgid:7168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed835d84 r8:00000002 r7:60000013 r6:ed835d8c r5:85560000 r4:85560000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85560000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed835e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c738c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85560000 r7:00000000 r6:83018000 r5:00001000 r4:7f383000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ad000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd8b8c r4:85bd8800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd8b8c r4:85b43d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560000 r8:85b43dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43d80 r8:80287e08 r7:ed829e60 r6:85b43e00 r5:85560000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed835fb0 to 0xed835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c73540 INFO: task kworker/0:770:7168 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ed839d84 r8:00000002 r7:60000113 r6:ed839d8c r5:85560c00 r4:85560c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85560c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed839e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85841740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85560c00 r7:00000000 r6:83018000 r5:00001000 r4:7f35b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ff000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c68b8c r4:85c68800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c68b8c r4:85b43e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560c00 r8:85b43eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b43e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b43e80 r8:80287e08 r7:ed829e60 r6:85b43f00 r5:85560c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed839fb0 to 0xed839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c739c0 INFO: task kworker/0:771:7169 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85563000 r8:85c7622c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85561800 r7:00000000 r6:83018000 r5:00001000 r4:7f365000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed69f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6a38c r4:85c6a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6a38c r4:85c76000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85561800 r8:85c7602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76000 r8:80287e08 r7:ed915e60 r6:85c76080 r5:85561800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed905fb0 to 0xed905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a98c0 INFO: task kworker/0:773:7221 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:7223 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:7223 tgid:7223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed919d84 r8:00000002 r7:60000113 r6:ed919d8c r5:85565400 r4:85565400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85565400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed919e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c90000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85565400 r7:00000000 r6:83018000 r5:00001000 r4:7f4c1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cf1b8c r4:85cf1800 r4:85c76100 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7225 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7225 tgid:7225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed91dd84 r8:00000002 r7:60000113 r6:ed91dd8c r5:85566000 r4:85566000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85566000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed91de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9e40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85566000 r7:00000000 r6:83018000 r5:00001000 r4:7f367000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6db000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd9b8c r4:85bd9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd9b8c r4:85c76300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85566000 r8:85c7632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76300 r8:80287e08 r7:ed919e60 r6:85c76380 r5:85566000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed91dfb0 to 0xed91dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:df9dddc0 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:776:7229 blocked for more than 470 seconds. r4:85566c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed801e08 r5:00001000 r4:ed58b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:df9dddc0 r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7385 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1a1d84 r8:00000002 r7:60000113 r6:ed1a1d8c r5:85564800 r4:85564800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85564800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c74680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85564800 r7:00000000 r6:83018000 r5:00001000 r4:7f4c5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85564800 r8:85c7652c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:778:7387 blocked for more than 470 seconds. r5:85562400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:7389 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:7389 tgid:7389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed6b9d84 r8:00000002 r7:60000113 r6:ed6b9d8c r5:85563c00 r4:85563c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85563c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c916c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85563c00 r7:00000000 r6:83018000 r5:00001000 r4:7f52d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8f5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479c38c r4:8479c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479c38c r4:85c76700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563c00 r8:85c7672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76700 r8:80287e08 r7:ed6a9e60 r6:85c76780 r5:85563c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b9fb0 to 0xed6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c742c0 INFO: task kworker/0:779:7389 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:7443 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:7443 tgid:7443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed815d84 r8:00000002 r7:60000113 r6:ed815d8c r5:84889800 r4:84889800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84889800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed815e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c91d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84889800 r7:00000000 r6:83018000 r5:00001000 r4:7f533000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed995000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479df8c r4:8479dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479df8c r4:85c76900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84889800 r8:85c7692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76900 r8:80287e08 r7:ed6b9e60 r6:85c76980 r5:84889800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:782:7447 blocked for more than 470 seconds. r4:84888000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed999e08 r5:00001000 r4:ed53d000 r7:dddced80 r6:83018000 r5:85bdaf8c r4:85c76a00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:783:7473 blocked for more than 470 seconds. r5:8488b000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a334c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8488b000 r7:00000000 r6:83018000 r5:00001000 r4:7f593000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed631000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85be8b8c r4:85be8800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85be8b8c r4:85c76b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488b000 r8:85c76b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76b00 r8:80287e08 r7:ed999e60 r6:85c76b80 r5:8488b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed98dfb0 to 0xed98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8577a8c0 INFO: task kworker/0:783:7473 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:7474 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:7474 tgid:7474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed9d5d84 r8:00000002 r7:60000113 r6:ed9d5d8c r5:8488bc00 r4:8488bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9d5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a333c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8488bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f591000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed619000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85be838c r4:85be8000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85be838c r4:85c76c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8488bc00 r8:85c76c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:7508 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:7508 tgid:7508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eda65d84 r8:00000002 r7:60000013 r6:eda65d8c r5:8488e000 r4:8488e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8488e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8488e000 r7:00000000 r6:83018000 r5:00001000 r4:7f59d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:786:7510 blocked for more than 470 seconds. r5:8488d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed09de08 r5:00001000 r4:ed663000 r7:dddced80 r6:83018000 r5:85be8f8c r4:85c76e00 r10:61c88647 r9:8488d400 r8:85c76e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c76e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c76e00 r8:80287e08 r7:eda65e60 r6:85c76e80 r5:8488d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed09dfb0 to 0xed09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a33500 INFO: task kworker/0:786:7510 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:787:7516 blocked for more than 470 seconds. r4:8488ec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4f240 r5:85be878c r4:85be8400 r10:61c88647 r9:8488ec00 r8:85c76f2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85ca578c r4:85ca5400 r10:61c88647 r9:847d8000 r8:85b43fac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:7530 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:7530 tgid:7530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eda71d84 r8:00000002 r7:60000113 r6:eda71d8c r5:847de000 r4:847de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda71e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a33e40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:847de000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8a1000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:847de000 r8:85a1a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84888c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5b9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:7538 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:7538 tgid:7538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edaa5d84 r8:00000002 r7:60000113 r6:edaa5d8c r5:85c20c00 r4:85c20c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c20c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaa5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4ff00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5f3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda2d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85be9f8c r4:85be9c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85be9f8c r4:85a1a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c20c00 r8:85a1a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1a280 r8:80287e08 r7:eda69e60 r6:85a1a300 r5:85c20c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaa5fb0 to 0xedaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d4f0c0 INFO: task kworker/0:791:7538 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85c22400 r8:85a1a3ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d4f080 INFO: task kworker/0:792:7540 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:793 state:D stack:0 pid:7569 tgid:7569 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edac5e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edae1e08 r9:83018005 r8:85c20000 r7:00000000 r6:83018000 r5:00001000 r4:7f593000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:7573 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:7573 tgid:7573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edae5d84 r8:00000002 r7:60000113 r6:edae5d8c r5:85c25400 r4:85c25400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c25400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edae5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76180 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c25400 r7:00000000 r6:83018000 r5:00001000 r4:7f5b9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85beb38c r4:85beb000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85beb38c r4:85a1a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c25400 r8:85a1a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1a680 r8:80287e08 r7:edaade60 r6:85a1a700 r5:85c25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedae5fb0 to 0xedae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a33dc0 INFO: task kworker/0:795:7573 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:7578 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:7578 tgid:7578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edaf1d84 r8:00000002 r7:60000113 r6:edaf1d8c r5:85c26c00 r4:85c26c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c26c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5f5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed057000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bebb8c r4:85beb800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bebb8c r4:85a1a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c26c00 r8:85a1a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1a780 r8:80287e08 r7:edae5e60 r6:85a1a800 r5:85c26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaf1fb0 to 0xedaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:797:7580 blocked for more than 470 seconds. r4:85c26000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edae9e08 r5:00001000 r4:ed611000 r7:dddced80 r6:83018000 r5:85ca738c r4:85a1a880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:7582 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:7582 tgid:7582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edaddd84 r8:00000002 r7:60000013 r6:edaddd8c r5:85c23c00 r4:85c23c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c23c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edadde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76140 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85beb78c r4:85beb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85beb78c r4:85a1a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c23c00 r8:85a1a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1a980 r8:80287e08 r7:edae9e60 r6:85a1aa00 r5:85c23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaddfb0 to 0xedaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d76300 INFO: task kworker/0:798:7582 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c23000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c23000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76a40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c23000 r7:00000000 r6:83018000 r5:00001000 r4:7f5fd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed683000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479e78c r4:8479e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479e78c r4:85a1aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c23000 r8:85a1aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:7586 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:7586 tgid:7586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edaf5d84 r8:00000002 r7:60000113 r6:edaf5d8c r5:85c21800 r4:85c21800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c21800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d767c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c21800 r7:00000000 r6:83018000 r5:00001000 r4:7f5fb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed651000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85be9b8c r4:85be9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85be9b8c r4:85a1ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c21800 r8:85a1abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1ab80 r8:80287e08 r7:edaf9e60 r6:85a1ac00 r5:85c21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaf5fb0 to 0xedaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d76780 INFO: task kworker/0:800:7586 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:801:7589 blocked for more than 470 seconds. r4:8488c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edafde08 r5:85bf038c r4:85bf0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:802:7590 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:802 state:D stack:0 pid:7590 tgid:7590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb01d84 r8:00000002 r7:60000113 r6:edb01d8c r5:85190000 r4:85190000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85190000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76ac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f5ff000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6c1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ca6b8c r4:85ca6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a1ad80 r8:80287e08 r7:edafde60 r6:85a1ae00 r5:85190000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:edb05d84 r8:00000002 r7:60000013 r6:edb05d8c r5:85190c00 r4:85190c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85190c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76c00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85190c00 r7:00000000 r6:83018000 r5:00001000 r4:7f601000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479f78c r4:8479f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479f78c r4:85a1ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85190c00 r8:85a1aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a1ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a1ae80 r8:80287e08 r7:edafde60 r6:85a1af00 r5:85190c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb05fb0 to 0xedb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:803:7592 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85bf138c r4:85a1af80 r10:00000000 r9:85a1af80 r8:80287e08 r7:edafde60 r6:85d69000 r5:85191800 INFO: task kworker/0:804:7594 is blocked on a mutex likely owned by task kworker/0:12:3148. Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f605000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed73f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf0b8c r4:85bf0800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf0b8c r4:85d69080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85192400 r8:85d690ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69080 r8:80287e08 r7:edb09e60 r6:85d69100 r5:85192400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb0dfb0 to 0xedb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0a080 INFO: task kworker/0:805:7597 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:7598 blocked for more than 470 seconds. r10:8291a684 r9:edb11d84 r8:00000002 r7:60000113 r6:edb11d8c r5:85193000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85d69180 r10:00000000 r9:85d69180 r8:80287e08 r7:edb09e60 r6:85d69200 r5:85193000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb11fb0 to 0xedb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0a080 INFO: task kworker/0:806:7598 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:edb25d84 r8:00000002 r7:60000013 r6:edb25d8c r5:85195400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85bf178c r4:85bf1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf178c r4:85d69280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85195400 r8:85d692ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69280 r8:80287e08 r7:edb11e60 r6:85d69300 r5:85195400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb25fb0 to 0xedb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0a500 INFO: task kworker/0:807:7603 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:808:7605 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:808 state:D stack:0 pid:7605 tgid:7605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb21d84 r8:00000002 r7:60000013 r6:edb21d8c r5:85193c00 r4:85193c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb21e08 r5:00001000 r4:ed8bb000 r5:85bf1f8c r4:85bf1c00 r10:61c88647 r9:85193c00 r8:85d693ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r4:85196000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb15e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:85d694ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69480 r8:80287e08 r7:edb21e60 r6:85d69500 r5:85196000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb15fb0 to 0xedb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0a300 INFO: task kworker/0:809:7607 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:810:7609 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:810 state:D stack:0 pid:7609 tgid:7609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb29d84 r8:00000002 r7:60000113 r6:edb29d8c r5:85194800 r4:85194800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85194800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb29e08 r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85d69580 r8:80287e08 r7:edb15e60 r6:85d69600 r5:85194800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb29fb0 to 0xedb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0a500 INFO: task kworker/0:810:7609 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8334b7c0 task:kworker/0:811 state:D stack:0 pid:7611 tgid:7611 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85c08c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85bf1b8c r4:85bf1800 r10:61c88647 r9:85c08c00 r8:85d696ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:7613 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:7613 tgid:7613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb3dd84 r8:00000002 r7:60000113 r6:edb3dd8c r5:85c0c800 r4:85c0c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c0c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb3de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d76e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f61d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb45000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf338c r4:85bf3000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf338c r4:85d69700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c0c800 r8:85d6972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69700 r8:80287e08 r7:edb15e60 r6:85b1e500 r5:85c0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb3dfb0 to 0xedb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0ae00 INFO: task kworker/0:812:7613 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:7615 tgid:7615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb4dd84 r8:00000002 r7:60000113 r6:edb4dd8c r5:85c0e000 r4:85c0e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c0e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a0af80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f61b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb3f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf2f8c r4:85bf2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf2f8c r4:85d69780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c0e000 r8:85d697ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69780 r8:80287e08 r7:edb3de60 r6:85b1e580 r5:85c0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb4dfb0 to 0xedb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a0ae00 INFO: task kworker/0:813:7615 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r5:85c0b000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb55e08 r5:00001000 r4:edb7b000 r5:85bf3b8c r4:85bf3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf3b8c r4:85d69800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c0b000 r8:85d6982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69800 r8:80287e08 r7:edb3de60 r6:85b1e600 r5:85c0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb55fb0 to 0xedb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d76d80 INFO: task kworker/0:814:7616 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 81fcb000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c0d400 r8:85d698ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c08000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb71e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85c08000 r8:85d6992c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xedb71fb0 to 0xedb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a2c100 INFO: task kworker/0:816:7620 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:817:7622 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:7622 tgid:7622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb79d84 r8:00000002 r7:60000113 r6:edb79d8c r5:85c09800 r4:85c09800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c09800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2c380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c09800 r7:00000000 r6:83018000 r5:00001000 r4:7f625000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb81000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf3f8c r4:85bf3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf3f8c r4:85d69980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c09800 r8:85d699ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69980 r8:80287e08 r7:edb55e60 r6:85b1e780 r5:85c09800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb79fb0 to 0xedb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:817:7622 is blocked on a mutex likely owned by task kworker/0:12:3148. dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:818:7624 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:818 state:D stack:0 pid:7624 tgid:7624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb89d84 r8:00000002 r7:60000113 r6:edb89d8c r5:85c0ec00 r4:85c0ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c0ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb89e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85d69a00 Exception stack(0xedb89fb0 to 0xedb89ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:819:7626 blocked for more than 470 seconds. r5:85c0bc00 r4:8291a680 r4:00000000 r9:83018005 r8:85c0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f627000 r7:dddced80 r6:83018000 r5:85bebf8c r4:85d69a80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r5:00001000 r4:dffe3000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:820:7629 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:820 state:D stack:0 pid:7629 tgid:7629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edbadd84 r8:00000002 r7:60000113 r6:edbadd8c r5:85c0a400 r4:85c0a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c0a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e99380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f781000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edecf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbfb8c r4:85dbf800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbfb8c r4:85d69b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c0a400 r8:85d69b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69b00 r8:80287e08 r7:edb89e60 r6:85b1e900 r5:85c0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbadfb0 to 0xedbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a2c5c0 INFO: task kworker/0:820:7629 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:821:7635 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:821 state:D stack:0 pid:7635 tgid:7635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edbbdd84 r8:00000002 r7:60000113 r6:edbbdd8c r5:85c28000 r4:85c28000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c28000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbbde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98080 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c28000 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9038c r4:85d90000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d9038c r4:85d69b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c28000 r8:85d69bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69b80 r8:80287e08 r7:edbade60 r6:85b1e980 r5:85c28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbbdfb0 to 0xedbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a2ca00 INFO: task kworker/0:821:7635 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 INFO: task kworker/0:822:7653 blocked for more than 470 seconds. [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018005 r8:85c2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f67b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedbc5fb0 to 0xedbc5ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 INFO: task kworker/0:823:7727 blocked for more than 470 seconds. r4:85c2ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce9e08 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbe78c r4:85dbe400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbe78c r4:85d69c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c2ec00 r8:85d69cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69c80 r8:80287e08 r7:edbade60 r6:85b1ea80 r5:85c2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce9fb0 to 0xedce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85dac0c0 INFO: task kworker/0:823:7727 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:824:7762 blocked for more than 470 seconds. r4:85c2b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb19e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xedb19fb0 to 0xedb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85dacbc0 INFO: task kworker/0:824:7762 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:7796 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:7796 tgid:7796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:826:7806 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:826 state:D stack:0 pid:7806 tgid:7806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eddcdd84 r8:00000002 r7:60000113 r6:eddcdd8c r5:85c2c800 r4:85c2c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c2c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e99280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f77f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edec9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbf78c r4:85dbf400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbf78c r4:85d69e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c2c800 r8:85d69e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d69e00 r8:80287e08 r7:edbade60 r6:85b1ec80 r5:85c2c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddcdfb0 to 0xeddcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e4e580 INFO: task kworker/0:826:7806 is blocked on a mutex likely owned by task kworker/0:12:3148. r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edb39000 r7:dddced80 r6:83018000 r5:85dc078c r4:85d69e80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:828:7848 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:828 state:D stack:0 pid:7848 tgid:7848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ede65d84 r8:00000002 r7:60000113 r6:ede65d8c r5:85920c00 r4:85920c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85920c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e99640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eded5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbff8c r4:85dbfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbff8c r4:85d69f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920c00 r8:85d69fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85d69f80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r5:80090113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:829:7855 blocked for more than 470 seconds. r5:85922400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e580 r7:dddced80 r6:83018000 r5:85dc138c r4:85e93080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:830 state:D stack:0 pid:7918 tgid:7918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee015d84 r8:00000002 r7:60000013 r6:ee015d8c r5:85920000 r4:85920000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85920000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee015e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85920000 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb99000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc0f8c r4:85dc0c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc0f8c r4:85e93180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920000 r8:85e931ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e93180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e93180 r8:80287e08 r7:edf15e60 r6:85e93200 r5:85920000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee015fb0 to 0xee015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e500 INFO: task kworker/0:830:7918 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:831:7919 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:831 state:D stack:0 pid:7919 tgid:7919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edf85d84 r8:00000002 r7:60000113 r6:edf85d8c r5:85923c00 r4:85923c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf85e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e75d40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8c7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee207000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc1f8c r4:85dc1c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc1f8c r4:85e93280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85923c00 r8:85e932ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e93280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e93280 r8:80287e08 r7:edf15e60 r6:85e93300 r5:85923c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf85fb0 to 0xedf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8582e040 INFO: task kworker/0:831:7919 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:82ac21e4 r4:df9dddc0 r4:00000000 r5:00001000 r4:dffe3000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:832:7930 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:832 state:D stack:0 pid:7930 tgid:7930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee019d84 r8:00000002 r7:60000113 r6:ee019d8c r5:85c29800 r4:85c29800 r5:85c29800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c29800 r8:85e933ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85926c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e75c40 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85e93400 Exception stack(0xee08dfb0 to 0xee08dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85e93500 r8:80287e08 r7:edf85e60 r6:85e93580 r5:85925400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:835 state:D stack:0 pid:8034 tgid:8034 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85926000 r7:00000000 r6:83018000 r5:00001000 r4:7f8f9000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e75980 INFO: task kworker/0:835:8034 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:8106 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:8106 tgid:8106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85196c00 r5:85196c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e94000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85e93700 r8:80287e08 r7:ee135e60 r6:85e93780 r5:85196c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:837:8108 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:837 state:D stack:0 pid:8108 tgid:8108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee301d84 r8:00000002 r7:60000113 r6:ee301d8c r5:854d0000 r4:854d0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee301e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e945c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f94f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496238c r4:84962000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496238c r4:85e93800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d0000 r8:85e9382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e93800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e94b80 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xee2f1fb0 to 0xee2f1ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:839:8113 blocked for more than 470 seconds. r4:85c2d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee305e08 r5:00001000 r4:ede27000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xee305fb0 to 0xee305ff8) INFO: task kworker/0:839:8113 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:8119 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:8119 tgid:8119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee311d84 r8:00000002 r7:60000113 r6:ee311d8c r5:854d1800 r4:854d1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee311e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e94f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85e93a00 Exception stack(0xee311fb0 to 0xee311ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e94cc0 INFO: task kworker/0:840:8119 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:8122 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:8122 tgid:8122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee315d84 r8:00000002 r7:60000113 r6:ee315d8c r5:854d2400 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:854d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f961000 r7:dddced80 r6:83018000 r5:85dc038c r4:85e93b00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee319d84 r8:00000002 r7:60000113 r6:ee319d8c r5:854d0c00 r4:854d0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee319e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84954440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f963000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edee5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc838c r4:85dc8000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc838c r4:85e93c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d0c00 r8:85e93c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e93c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e93c00 r8:80287e08 r7:ee315e60 r6:85e93c80 r5:854d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee319fb0 to 0xee319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e94e00 INFO: task kworker/0:842:8124 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854d3c00 r8:85e93d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:844:8128 blocked for more than 470 seconds. r4:85c05400 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8c340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85c05400 r7:00000000 r6:83018000 r5:00001000 r4:7f967000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf7f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc938c r4:85dc9000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc938c r4:85e93e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c05400 r8:85e93e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e93e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e93e00 r8:80287e08 r7:ee30de60 r6:85b1ee80 r5:85c05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee31dfb0 to 0xee31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c8c140 INFO: task kworker/0:844:8128 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:845:8131 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:845 state:D stack:0 pid:8131 tgid:8131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee329d84 r8:00000002 r7:60000113 r6:ee329d8c r5:85d58c00 r4:85d58c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d58c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8c780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85e93e80 r8:80287e08 r7:ee31de60 r6:85b1ef00 r5:85d58c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:8132 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:8132 tgid:8132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee32dd84 r8:00000002 r7:60000013 r6:ee32dd8c r5:85d59800 r4:85d59800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d59800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee32de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8c480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85d59800 r7:00000000 r6:83018000 r5:00001000 r4:7f969000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0c5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r5:80090113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:847:8133 blocked for more than 470 seconds. [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:854d4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8c500 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f971000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0fb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc9b8c r4:85dc9800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc9b8c r4:85c94080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d4800 r8:85c940ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94080 r8:80287e08 r7:ee329e60 r6:85c94100 r5:854d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2edfb0 to 0xee2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c8c100 INFO: task kworker/0:847:8133 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85c94180 Exception stack(0xee331fb0 to 0xee331ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee219e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8c940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f96f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0ef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dca78c r4:85dca400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dca78c r4:85c94280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d6c00 r8:85c942ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94280 r8:80287e08 r7:ee2ede60 r6:85c94300 r5:854d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee219fb0 to 0xee219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c8c900 INFO: task kworker/0:849:8138 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:8141 blocked for more than 470 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:8141 tgid:8141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee335d84 r8:00000002 r7:60000113 r6:ee335d8c r5:854d3000 r4:854d3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee335e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f973000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee10b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dcab8c r4:85dca800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dcab8c r4:85c94380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d3000 r8:85c943ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94380 r8:80287e08 r7:ee2ede60 r6:85c94400 r5:854d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:850:8141 is blocked on a mutex likely owned by task kworker/0:12:3148. dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r4:849f1580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r4:85923000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee339e08 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85c94480 Exception stack(0xee339fb0 to 0xee339ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee33dd84 r8:00000002 r7:60000013 r6:ee33dd8c r5:85924800 r4:85924800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85924800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8ce40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85924800 r7:00000000 r6:83018000 r5:00001000 r4:7f977000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee125000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc878c r4:85dc8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc878c r4:85c94680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85924800 r8:85c946ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94680 r8:80287e08 r7:ee339e60 r6:85c94700 r5:85924800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e94400 INFO: task kworker/0:852:8145 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:8146 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:8146 tgid:8146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee341d84 r8:00000002 r7:60000013 r6:ee341d8c r5:85b60000 r4:85b60000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b60000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee341e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eacf80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b60000 r7:00000000 r6:83018000 r5:00001000 r4:7f97b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee145000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f6778c r4:85f67400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85f6778c r4:85c94580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b60000 r8:85c945ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94580 r8:80287e08 r7:ee33de60 r6:85c94600 r5:85b60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:853:8146 is blocked on a mutex likely owned by task kworker/0:12:3148. Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85b60c00 r7:00000000 r6:83018000 r5:00001000 r4:7f979000 r7:dddced80 r6:83018000 r5:85dcbb8c r4:85c94780 r10:00000000 r9:85c94780 r8:80287e08 r7:ee341e60 r6:85c94800 r5:85b60c00 INFO: task kworker/0:854:8148 is blocked on a mutex likely owned by task kworker/0:12:3148. dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:82ac21e4 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:855:8149 blocked for more than 471 seconds. r4:85b62400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee34de08 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dcb78c r4:85dcb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dcb78c r4:85c94880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b62400 r8:85c948ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94880 r8:80287e08 r7:ee341e60 r6:85c94900 r5:85b62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee34dfb0 to 0xee34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab240 INFO: task kworker/0:855:8149 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:856:8155 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:856 state:D stack:0 pid:8155 tgid:8155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee35dd84 r8:00000002 r7:60000113 r6:ee35dd8c r5:85b63000 r4:85b63000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b63000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee35de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eab6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b63000 r7:00000000 r6:83018000 r5:00001000 r4:7f983000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee183000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dca38c r4:85dca000 r7:dddced80 r6:83018000 r5:85dca38c r4:85c94980 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee1f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dcaf8c r4:85dcac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dcaf8c r4:85c94a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d5bc00 r8:85c94aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94a80 r8:80287e08 r7:ee34de60 r6:85b1e300 r5:85d5bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee349fb0 to 0xee349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab780 INFO: task kworker/0:857:8156 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eabac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85d5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f987000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee20b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496078c r4:84960400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496078c r4:85c94b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d5d400 r8:85c94b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94b00 r8:80287e08 r7:ee34de60 r6:85b1e380 r5:85d5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee365fb0 to 0xee365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab5c0 INFO: task kworker/0:858:8159 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dd478c r4:85c94b80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:860:8164 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:860 state:D stack:0 pid:8164 tgid:8164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee361d84 r8:00000002 r7:60000113 r6:ee361d8c r5:85b64800 r4:85b64800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b64800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee361e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eabe80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b64800 r7:00000000 r6:83018000 r5:00001000 r4:7f98d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee295000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85dd4f8c r4:85dd4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b65400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee36de08 r4:00000000 r5:85dd538c r4:85dd5000 r10:61c88647 r9:85b65400 r8:85c94dac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:862 state:D stack:0 pid:8167 tgid:8167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee371d84 r8:00000002 r7:60000113 r6:ee371d8c r5:85b66000 r4:85b66000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b66000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee371e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8cfc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b66000 r7:00000000 r6:83018000 r5:00001000 r4:7f991000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd578c r4:85dd5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd578c r4:85c94e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b66000 r8:85c94eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94e80 r8:80287e08 r7:ee36de60 r6:85c94f00 r5:85b66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee371fb0 to 0xee371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eabcc0 INFO: task kworker/0:862:8167 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f993000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e94400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b61800 r7:00000000 r6:83018000 r5:00001000 r4:7f995000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2cf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd4b8c r4:85dd4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd4b8c r4:85cec000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b61800 r8:85cec02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec000 r8:80287e08 r7:ee375e60 r6:85cec080 r5:85b61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee379fb0 to 0xee379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eabcc0 INFO: task kworker/0:864:8171 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:865:8173 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:8173 tgid:8173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee37dd84 r8:00000002 r7:60000113 r6:ee37dd8c r5:84918000 r4:84918000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84918000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855280c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84918000 r7:00000000 r6:83018000 r5:00001000 r4:7f997000 r5:85dd638c r4:85dd6000 r7:dddced80 r6:83018000 r5:85dd638c r4:85cec100 r10:00000000 r9:85cec100 r8:80287e08 r7:ee379e60 r6:85cec180 r5:84918000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:866:8175 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:866 state:D stack:0 pid:8175 tgid:8175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee381d84 r8:00000002 r7:60000113 r6:ee381d8c r5:84918c00 r4:84918c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84918c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee381e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84918c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb65000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee73b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dddf8c r4:85dddc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dddf8c r4:85cec200 r10:61c88647 r9:84918c00 r8:85cec22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85d5c800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dd678c r4:85dd6400 r10:61c88647 r9:85d5c800 r8:85cec32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85d5b000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dd5f8c r4:85dd5c00 r10:61c88647 r9:85d5b000 r8:85cec3ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:8184 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:8184 tgid:8184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee351d84 r8:00000002 r7:60000013 r6:ee351d8c r5:85d5a400 r4:85d5a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d5a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee351e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e747c0 r5:85ddc78c r4:85ddc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:8456 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85d5e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee88de08 r9:83018005 r8:85d5e000 r7:00000000 r6:83018000 r5:00001000 r4:7fb5b000 r5:85ddcf8c r4:85ddcc00 r10:61c88647 r9:85d5e000 r8:85cec4ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85d58000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85cec500 r8:80287e08 r7:ee381e60 r6:859fd380 r5:85d58000 r4:85e74680 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee891d84 r8:00000002 r7:60000013 r6:ee891d8c r5:8491d400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ddcb8c r4:85ddc800 r7:dddced80 r6:83018000 r5:85ddcb8c r4:85cec580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491d400 r8:85cec5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec580 r8:80287e08 r7:ee381e60 r6:85cec600 r5:8491d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee891fb0 to 0xee891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e74b00 INFO: task kworker/0:872:8461 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:873:8463 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:873 state:D stack:0 pid:8463 tgid:8463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee875d84 r8:00000002 r7:60000013 r6:ee875d8c r5:85d5ec00 r4:85d5ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d5ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee875e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85d5ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb63000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ddd78c r4:85ddd400 r10:61c88647 r9:85d5ec00 r8:85cec6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee8a1d84 r8:00000002 r7:60000013 r6:ee8a1d8c r5:85c06000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dde38c r4:85dde000 r10:61c88647 r9:85c06000 r8:85cec72c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:875:8468 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:875 state:D stack:0 pid:8468 tgid:8468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8a9d84 r8:00000002 r7:60000113 r6:ee8a9d8c r5:85f00c00 r4:85f00c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f00c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f00c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb73000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddeb8c r4:85dde800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddeb8c r4:85cec780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f00c00 r8:85cec7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec780 r8:80287e08 r7:ee8a1e60 r6:859fd500 r5:85f00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8a9fb0 to 0xee8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8600f680 INFO: task kworker/0:875:8468 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:876:8469 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:8469 tgid:8469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8add84 r8:00000002 r7:60000113 r6:ee8add8c r5:85f01800 r4:85f01800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f01800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8600f900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f01800 r7:00000000 r6:83018000 r5:00001000 r4:7fb69000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee78f000 r5:85dde78c r4:85dde400 r7:dddced80 r6:83018000 r5:85dde78c r4:85cec800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:877:8471 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:877 state:D stack:0 pid:8471 tgid:8471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8b5d84 r8:00000002 r7:60000113 r6:ee8b5d8c r5:85f00000 r4:85f00000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f00000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84954b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f00000 r7:00000000 r6:83018000 r5:00001000 r4:7fb6b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddc38c r4:85ddc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddc38c r4:85cec880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f00000 r8:85cec8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec880 r8:80287e08 r7:ee8a9e60 r6:859fd600 r5:85f00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8b5fb0 to 0xee8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e74f40 INFO: task kworker/0:877:8471 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8491c800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ddef8c r4:85ddec00 r7:dddced80 r6:83018000 r5:85ddef8c r4:85cec900 r10:00000000 r9:85cec900 r8:80287e08 r7:ee8a9e60 r6:85cec980 r5:8491c800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:8476 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:8476 tgid:8476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8bdd84 r8:00000002 r7:60000113 r6:ee8bdd8c r5:8491ec00 r4:8491ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8491ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb6f000 r7:dddced80 r6:83018000 r5:85dddb8c r4:85ceca00 r4:00000001 r4:85fb2280 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8491bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb71000 r10:61c88647 r9:8491bc00 r8:85cecb2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r4:85f02400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f02400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb27c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f02400 r7:00000000 r6:83018000 r5:00001000 r4:7fb75000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7f3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddff8c r4:85ddfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddff8c r4:85cecc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f02400 r8:85cecc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecc00 r8:80287e08 r7:ee8a9e60 r6:859fd680 r5:85f02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8d1fb0 to 0xee8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2080 INFO: task kworker/0:881:8480 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:8482 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85f03c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85ddfb8c r4:85cecc80 r10:61c88647 r9:85f03c00 r8:85ceccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:8483 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:8483 tgid:8483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8c5d84 r8:00000002 r7:60000113 r6:ee8c5d8c r5:8491a400 r4:8491a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8491a400 r7:00000000 r6:83018000 r5:00001000 r4:7fb77000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8cd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496538c r4:84965000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496538c r4:85cecd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491a400 r8:85cecd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecd00 r8:80287e08 r7:ee8d9e60 r6:85cecd80 r5:8491a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8c5fb0 to 0xee8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb26c0 INFO: task kworker/0:883:8483 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:8486 blocked for more than 471 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ee8d5d84 r8:00000002 r7:60000113 r6:ee8d5d8c r5:8491e000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85cece00 r8:80287e08 r7:ee8d9e60 r6:85cece80 r5:8491e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8d5fb0 to 0xee8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb26c0 INFO: task kworker/0:884:8486 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:8487 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:8487 tgid:8487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee899d84 r8:00000002 r7:60000013 r6:ee899d8c r5:84919800 r4:84919800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84919800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee899e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84919800 r7:00000000 r6:83018000 r5:00001000 r4:7fb7d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de4b8c r4:85de4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de4b8c r4:85cecf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84919800 r8:85cecf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecf00 r8:80287e08 r7:ee8d5e60 r6:85cecf80 r5:84919800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee899fb0 to 0xee899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2a80 INFO: task kworker/0:885:8487 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:8490 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:8490 tgid:8490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8edd84 r8:00000002 r7:60000013 r6:ee8edd8c r5:8491b000 r4:8491b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8491b000 r7:00000000 r6:83018000 r5:00001000 r4:7fb81000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee90b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de578c r4:85de5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de578c r4:85f98000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491b000 r8:85f9802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98000 r8:80287e08 r7:ee899e60 r6:85f98080 r5:8491b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8edfb0 to 0xee8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2d80 INFO: task kworker/0:886:8490 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee901d84 r8:00000002 r7:60000013 r6:ee901d8c r5:849d8000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85de538c r4:85de5000 r10:61c88647 r9:849d8000 r8:85f9812c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:888:8494 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:888 state:D stack:0 pid:8494 tgid:8494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee909d84 r8:00000002 r7:60000113 r6:ee909d8c r5:849d8c00 r4:849d8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee909e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf2c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb83000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee911000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de5b8c r4:85de5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de5b8c r4:85f98200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d8c00 r8:85f9822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98200 r8:80287e08 r7:ee8ede60 r6:85f98280 r5:849d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee909fb0 to 0xee909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fbf200 INFO: task kworker/0:888:8494 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:8496 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ee915d84 r8:00000002 r7:60000113 r6:ee915d8c r5:849d9800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849d9800 r8:85f9832c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:890:8498 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:890 state:D stack:0 pid:8498 tgid:8498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee91dd84 r8:00000002 r7:60000113 r6:ee91dd8c r5:849da400 r4:849da400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849da400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85de678c r4:85de6400 r7:dddced80 r6:83018000 r5:85de678c r4:85f98400 r10:00000000 r9:85f98400 r8:80287e08 r7:ee915e60 r6:85f98480 r5:849da400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ee8f5d84 r8:00000002 r7:60000113 r6:ee8f5d8c r5:849dbc00 r4:849dbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849dbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb43000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de6f8c r4:85de6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de6f8c r4:85f98500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dbc00 r8:85f9852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98500 r8:80287e08 r7:ee91de60 r6:85f98580 r5:849dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849dc800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee929e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85de778c r4:85de7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de778c r4:85f98600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dc800 r8:85f9862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98600 r8:80287e08 r7:ee8f5e60 r6:85f98680 r5:849dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee929fb0 to 0xee929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fbf880 INFO: task kworker/0:892:8504 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:893:8505 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:893 state:D stack:0 pid:8505 tgid:8505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee935d84 r8:00000002 r7:60000113 r6:ee935d8c r5:849dd400 r4:849dd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849dd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee935e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ee4d9000 r5:8496278c r4:84962400 r10:61c88647 r9:849dd400 r8:85f9872c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:8544 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:894 state:D stack:0 pid:8544 tgid:8544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea1dd84 r8:00000002 r7:60000013 r6:eea1dd8c r5:849de000 r4:849de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:85de6b8c r4:85de6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:895:8545 blocked for more than 471 seconds. r5:849dec00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85de7f8c r4:85de7c00 r10:61c88647 r9:849dec00 r8:85f9892c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:849db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee879e08 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849db000 r7:00000000 r6:83018000 r5:00001000 r4:7fb55000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee607000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de738c r4:85de7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de738c r4:85f98a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849db000 r8:85f98a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98a00 r8:80287e08 r7:ee935e60 r6:85f98a80 r5:849db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee879fb0 to 0xee879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529f100 INFO: task kworker/0:896:8548 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:8550 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:8550 tgid:8550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee881d84 r8:00000002 r7:60000113 r6:ee881d8c r5:84b68000 r4:84b68000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee881e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b68000 r7:00000000 r6:83018000 r5:00001000 r4:7fb59000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee639000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85decb8c r4:85dec800 r7:dddced80 r6:83018000 r5:85decb8c r4:85f98b00 r10:00000000 r9:85f98b00 r8:80287e08 r7:ee879e60 r6:85f98b80 r5:84b68000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:df9dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84b68c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee885e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dec38c r4:85f98c00 Exception stack(0xee885fb0 to 0xee885ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b69800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85f98d00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85ded78c r4:85ded400 r7:dddced80 r6:83018000 r5:85ded78c r4:85f98e00 r10:00000000 r9:85f98e00 r8:80287e08 r7:ee8dde60 r6:85f98e80 r5:84b6a400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:8558 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:8558 tgid:8558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea25d84 r8:00000002 r7:60000113 r6:eea25d8c r5:84b6b000 r4:84b6b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fdc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b6b000 r7:00000000 r6:83018000 r5:00001000 r4:7fb65000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dedf8c r4:85dedc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dedf8c r4:85f98f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6b000 r8:85f98f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98f00 r8:80287e08 r7:eea21e60 r6:85f98f80 r5:84b6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea25fb0 to 0xeea25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529f500 INFO: task kworker/0:901:8558 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:902:8560 blocked for more than 471 seconds. r4:84b6c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee87de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529fa40 INFO: task kworker/0:902:8560 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:903:8561 blocked for more than 471 seconds. r4:84b6d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea2de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dec78c r4:85b36100 r10:00000000 r9:85b36100 r8:80287e08 r7:eea25e60 r6:85b36180 r5:84b6d400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b6e000 r7:00000000 r6:83018000 r5:00001000 r4:7fb6b000 r7:dddced80 r6:83018000 r5:85def38c r4:85b36200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:8566 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:8566 tgid:8566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea35d84 r8:00000002 r7:60000013 r6:eea35d8c r5:84b6ec00 r4:84b6ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ff80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb67000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dee78c r4:85dee400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dee78c r4:85b36300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6ec00 r8:85b3632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36300 r8:80287e08 r7:eea29e60 r6:85b36380 r5:84b6ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea35fb0 to 0xeea35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c000 INFO: task kworker/0:905:8566 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85b36400 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c580 INFO: task kworker/0:906:8569 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eea31d84 r8:00000002 r7:60000013 r6:eea31d8c r5:85018000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea31e08 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85defb8c r4:85def800 r10:61c88647 r9:85018000 r8:85b3652c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:8573 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:8573 tgid:8573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea45d84 r8:00000002 r7:60000113 r6:eea45d8c r5:85018c00 r4:85018c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea45e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1c700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb6f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee89d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85deff8c r4:85defc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85deff8c r4:85b36600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:85b3662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36600 r8:80287e08 r7:eea31e60 r6:85b36680 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea45fb0 to 0xeea45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c440 INFO: task kworker/0:908:8573 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r4:00000000 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:909:8575 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eea49d84 r8:00000002 r7:60000013 r6:eea49d8c r5:85019800 r4:85019800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1c880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85019800 r7:00000000 r6:83018000 r5:00001000 r4:7fb71000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8af000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85decf8c r4:85decc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85decf8c r4:85b36700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:85b3672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36700 r8:80287e08 r7:eea45e60 r6:85b36780 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea49fb0 to 0xeea49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c540 INFO: task kworker/0:909:8575 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8501b000 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85def78c r4:85def400 r10:61c88647 r9:8501b000 r8:85b3682c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8501bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1cf80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb7b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de7b8c r4:85de7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de7b8c r4:85b36900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501bc00 r8:85b3692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36900 r8:80287e08 r7:eea41e60 r6:85b36980 r5:8501bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea51fb0 to 0xeea51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c940 INFO: task kworker/0:911:8578 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:8580 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:8580 tgid:8580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea59d84 r8:00000002 r7:60000013 r6:eea59d8c r5:8501d400 r4:8501d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:85b36a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85b36a00 r8:80287e08 r7:eea51e60 r6:85b36a80 r5:8501d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85b1cbc0 INFO: task kworker/0:912:8580 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:8582 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:8582 tgid:8582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea4dd84 r8:00000002 r7:60000113 r6:eea4dd8c r5:85f03000 r4:85f03000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f03000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1ce80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f03000 r7:00000000 r6:83018000 r5:00001000 r4:7fb79000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8f1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddf38c r4:85ddf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddf38c r4:85b36b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f03000 r8:85b36b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36b00 r8:80287e08 r7:eea51e60 r6:859fd780 r5:85f03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea4dfb0 to 0xeea4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cb00 INFO: task kworker/0:913:8582 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:8585 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:8585 tgid:8585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea65d84 r8:00000002 r7:60000013 r6:eea65d8c r5:85f05400 r4:85f05400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f05400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f05400 r7:00000000 r6:83018000 r5:00001000 r4:7fb7d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee90f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605038c r4:86050000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605038c r4:85b36b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f05400 r8:85b36bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36b80 r8:80287e08 r7:eea51e60 r6:859fd800 r5:85f05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea65fb0 to 0xeea65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cd00 INFO: task kworker/0:914:8585 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:8587 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:8587 tgid:8587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea6dd84 r8:00000002 r7:60000113 r6:eea6dd8c r5:85f06c00 r4:85f06c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f06c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f06c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb85000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea89000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86051b8c r4:86051800 r7:dddced80 r6:83018000 r5:86051b8c r4:85b36d80 r4:85b36d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8529fb00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r4:00000000 r5:00001000 r4:dffe3000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:8588 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:8588 tgid:8588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea71d84 r8:00000002 r7:60000113 r6:eea71d8c r5:85f04800 r4:85f04800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f04800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea71e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fd80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f04800 r7:00000000 r6:83018000 r5:00001000 r4:7fb7f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee921000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86050b8c r4:86050800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86050b8c r4:85b36c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f04800 r8:85b36c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36c00 r8:80287e08 r7:eea6de60 r6:859fd900 r5:85f04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea71fb0 to 0xeea71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529fb00 INFO: task kworker/0:916:8588 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:df9dddc0 r5:00001000 r4:dffe3000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85f06000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea7de08 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f06000 r7:00000000 r6:83018000 r5:00001000 r4:7fb81000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee92d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605138c r4:86051000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605138c r4:85b36e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f06000 r8:85b36eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36e80 r8:80287e08 r7:eea6de60 r6:859fd980 r5:85f06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea7dfb0 to 0xeea7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6040 INFO: task kworker/0:917:8590 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 r4:00000000 r5:8529a38c r4:8529a000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8334b7c0 r4:85c2bc00 r5:85c2bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea8dfb0 to 0xeea8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc60c0 INFO: task kworker/0:918:8592 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:8594 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:8594 tgid:8594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea99d84 r8:00000002 r7:60000013 r6:eea99d8c r5:85f08c00 r4:85f08c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f08c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f08c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbdd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeae3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86052f8c r4:86052c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86052f8c r4:85b36d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f08c00 r8:85b36d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36d00 r8:80287e08 r7:eea6de60 r6:859fda80 r5:85f08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea99fb0 to 0xeea99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6040 INFO: task kworker/0:919:8594 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:8596 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:8596 tgid:8596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeaa1d84 r8:00000002 r7:60000013 r6:eeaa1d8c r5:85f08000 r4:85f08000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f08000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeaa1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f08000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaa9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605078c r4:86050400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605078c r4:85b36e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f08000 r8:85b36e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36e00 r8:80287e08 r7:eea99e60 r6:859fdb00 r5:85f08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeaa1fb0 to 0xeeaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc60c0 INFO: task kworker/0:920:8596 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:8599 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:8599 tgid:8599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeabdd84 r8:00000002 r7:60000113 r6:eeabdd8c r5:85f0a400 r4:85f0a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeabde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0a400 r7:00000000 r6:83018000 r5:00001000 r4:7fbd5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeab3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605238c r4:86052000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605238c r4:85b36f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0a400 r8:85b36f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36f00 r8:80287e08 r7:eea99e60 r6:859fdb80 r5:85f0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeabdfb0 to 0xeeabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6780 INFO: task kworker/0:921:8599 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:8601 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:8601 tgid:8601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeac5d84 r8:00000002 r7:60000113 r6:eeac5d8c r5:85f0bc00 r4:85f0bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeac5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fbd7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeab9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86050f8c r4:86050c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86050f8c r4:85b36f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0bc00 r8:85b36fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36f80 r8:80287e08 r7:eea99e60 r6:859fdc00 r5:85f0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeac5fb0 to 0xeeac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6740 INFO: task kworker/0:922:8601 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:8603 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:8603 tgid:8603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eead9d84 r8:00000002 r7:60000013 r6:eead9d8c r5:85f0b000 r4:85f0b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eead9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0b000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeacf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86052b8c r4:86052800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86052b8c r4:85fbc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0b000 r8:85fbc02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc000 r8:80287e08 r7:eea99e60 r6:859fdc80 r5:85f0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeead9fb0 to 0xeead9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6640 INFO: task kworker/0:923:8603 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:8605 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:8605 tgid:8605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeae1d84 r8:00000002 r7:60000013 r6:eeae1d8c r5:85f0c800 r4:85f0c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeae1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6a00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0c800 r7:00000000 r6:83018000 r5:00001000 r4:7fbdb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eead5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605278c r4:86052400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605278c r4:85fbc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0c800 r8:85fbc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc080 r8:80287e08 r7:eea99e60 r6:859fdd00 r5:85f0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeae1fb0 to 0xeeae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc64c0 INFO: task kworker/0:924:8605 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:8608 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:8608 tgid:8608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeaedd84 r8:00000002 r7:60000013 r6:eeaedd8c r5:85f0d400 r4:85f0d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeaede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0d400 r7:00000000 r6:83018000 r5:00001000 r4:7fbe1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaf3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86053b8c r4:86053800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86053b8c r4:85fbc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0d400 r8:85fbc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc100 r8:80287e08 r7:eea99e60 r6:859fdd80 r5:85f0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeaedfb0 to 0xeeaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6880 INFO: task kworker/0:925:8608 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:8610 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:8610 tgid:8610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeafdd84 r8:00000002 r7:60000013 r6:eeafdd8c r5:85f0e000 r4:85f0e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeafde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0e000 r7:00000000 r6:83018000 r5:00001000 r4:7fbdf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeae9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605338c r4:86053000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605338c r4:85fbc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0e000 r8:85fbc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc180 r8:80287e08 r7:eeaede60 r6:859fde00 r5:85f0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeafdfb0 to 0xeeafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6a80 INFO: task kworker/0:926:8610 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:8611 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:8611 tgid:8611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb01d84 r8:00000002 r7:60000013 r6:eeb01d8c r5:85f0ec00 r4:85f0ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fbe3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaf9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86051f8c r4:86051c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86051f8c r4:85fbc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0ec00 r8:85fbc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc200 r8:80287e08 r7:eeaede60 r6:859fde80 r5:85f0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb01fb0 to 0xeeb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6e80 INFO: task kworker/0:927:8611 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:8614 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:8614 tgid:8614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb0dd84 r8:00000002 r7:60000113 r6:eeb0dd8c r5:854d6000 r4:854d6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d6000 r7:00000000 r6:83018000 r5:00001000 r4:7fb21000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee393000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605838c r4:86058000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605838c r4:85fbc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d6000 r8:85fbc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc280 r8:80287e08 r7:eeb01e60 r6:859fdf00 r5:854d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb0dfb0 to 0xeeb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6e80 INFO: task kworker/0:928:8614 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:8615 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:8615 tgid:8615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeacdd84 r8:00000002 r7:60000113 r6:eeacdd8c r5:8501e000 r4:8501e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeacde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f99740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501e000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb0f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85deeb8c r4:85dee800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85deeb8c r4:85fbc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501e000 r8:85fbc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc300 r8:80287e08 r7:eeb0de60 r6:85fbc380 r5:8501e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeacdfb0 to 0xeeacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85f99f80 INFO: task kworker/0:929:8615 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:8618 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:8618 tgid:8618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb09d84 r8:00000002 r7:60000113 r6:eeb09d8c r5:8501ec00 r4:8501ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df877000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605378c r4:86053400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605378c r4:85fbc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501ec00 r8:85fbc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc400 r8:80287e08 r7:eeb0de60 r6:85fbc480 r5:8501ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb09fb0 to 0xeeb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c240 INFO: task kworker/0:930:8618 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:8619 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:8619 tgid:8619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea5dd84 r8:00000002 r7:60000113 r6:eea5dd8c r5:8501c800 r4:8501c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea5de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7fb43000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86058b8c r4:86058800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86058b8c r4:85fbc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:85fbc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc500 r8:80287e08 r7:eeb0de60 r6:85fbc580 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea5dfb0 to 0xeea5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85f99f80 INFO: task kworker/0:931:8619 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:8621 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:8621 tgid:8621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb21d84 r8:00000002 r7:60000113 r6:eeb21d8c r5:85b70000 r4:85b70000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b70000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee695000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86058f8c r4:86058c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86058f8c r4:85fbc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70000 r8:85fbc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc600 r8:80287e08 r7:eea5de60 r6:85fbc680 r5:85b70000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb21fb0 to 0xeeb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7100 INFO: task kworker/0:932:8621 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:8624 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:8624 tgid:8624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb1dd84 r8:00000002 r7:60000113 r6:eeb1dd8c r5:85b71800 r4:85b71800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b71800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7d40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b71800 r7:00000000 r6:83018000 r5:00001000 r4:7fbf1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee70b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605a38c r4:8605a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605a38c r4:85fbc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b71800 r8:85fbc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc700 r8:80287e08 r7:eeb21e60 r6:85fbc780 r5:85b71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb1dfb0 to 0xeeb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7300 INFO: task kworker/0:933:8624 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:8626 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:8626 tgid:8626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb29d84 r8:00000002 r7:60000013 r6:eeb29d8c r5:85b73000 r4:85b73000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b73000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb29e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b73000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605978c r4:86059400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605978c r4:85fbc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b73000 r8:85fbc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc800 r8:80287e08 r7:eeb1de60 r6:85fbc880 r5:85b73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb29fb0 to 0xeeb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa75c0 INFO: task kworker/0:934:8626 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:8627 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:8627 tgid:8627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb2dd84 r8:00000002 r7:60000013 r6:eeb2dd8c r5:85b74800 r4:85b74800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b74800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b74800 r7:00000000 r6:83018000 r5:00001000 r4:7fbeb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6d3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86059b8c r4:86059800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86059b8c r4:85fbc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b74800 r8:85fbc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc900 r8:80287e08 r7:eeb1de60 r6:85fbc980 r5:85b74800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb2dfb0 to 0xeeb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7840 INFO: task kworker/0:935:8627 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:8630 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:8630 tgid:8630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb35d84 r8:00000002 r7:60000013 r6:eeb35d8c r5:85b73c00 r4:85b73c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b73c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b73c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86059f8c r4:86059c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86059f8c r4:85fbca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b73c00 r8:85fbca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbca00 r8:80287e08 r7:eeb1de60 r6:85fbca80 r5:85b73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb35fb0 to 0xeeb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa75c0 INFO: task kworker/0:936:8630 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:8634 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:8634 tgid:8634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb31d84 r8:00000002 r7:60000113 r6:eeb31d8c r5:85b72400 r4:85b72400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b72400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b72400 r7:00000000 r6:83018000 r5:00001000 r4:7fbf3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee723000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ab8c r4:8605a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ab8c r4:85fbcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b72400 r8:85fbcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcb00 r8:80287e08 r7:eeb1de60 r6:85fbcb80 r5:85b72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb31fb0 to 0xeeb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7b00 INFO: task kworker/0:937:8634 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:8635 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:8635 tgid:8635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb39d84 r8:00000002 r7:60000113 r6:eeb39d8c r5:85b76000 r4:85b76000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b76000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb39e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b76000 r7:00000000 r6:83018000 r5:00001000 r4:7fbf5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee739000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605b38c r4:8605b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605b38c r4:85fbcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b76000 r8:85fbcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcc00 r8:80287e08 r7:eeb31e60 r6:85fbcc80 r5:85b76000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb39fb0 to 0xeeb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:938:8635 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:8638 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:8638 tgid:8638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb25d84 r8:00000002 r7:60000113 r6:eeb25d8c r5:85b76c00 r4:85b76c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b76c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b76c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbfb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee859000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605878c r4:86058400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605878c r4:85fbcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b76c00 r8:85fbcd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcd00 r8:80287e08 r7:eeb39e60 r6:85fbcd80 r5:85b76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb25fb0 to 0xeeb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:939:8638 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:8640 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:8640 tgid:8640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb41d84 r8:00000002 r7:60000113 r6:eeb41d8c r5:85b70c00 r4:85b70c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb42c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b70c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbf9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee849000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605a78c r4:8605a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605a78c r4:85fbce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70c00 r8:85fbce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbce00 r8:80287e08 r7:eeb25e60 r6:85fbce80 r5:85b70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb41fb0 to 0xeeb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4280 INFO: task kworker/0:940:8640 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:941:8643 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:941 state:D stack:0 pid:8643 tgid:8643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb4dd84 r8:00000002 r7:60000113 r6:eeb4dd8c r5:85f13c00 r4:85f13c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f13c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f13c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbfd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee86d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605bb8c r4:8605b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605bb8c r4:85c94f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f13c00 r8:85c94fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94f80 r8:80287e08 r7:eeb25e60 r6:859fdf80 r5:85f13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb4dfb0 to 0xeeb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb46c0 INFO: task kworker/0:941:8643 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:8645 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:8645 tgid:8645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb51d84 r8:00000002 r7:60000013 r6:eeb51d8c r5:85f11800 r4:85f11800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f11800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f11800 r7:00000000 r6:83018000 r5:00001000 r4:7fc03000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee99f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605af8c r4:8605ac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605af8c r4:85fbcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f11800 r8:85fbcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcf00 r8:80287e08 r7:eeb4de60 r6:859fd180 r5:85f11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb51fb0 to 0xeeb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4600 INFO: task kworker/0:942:8645 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:8646 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:8646 tgid:8646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb55d84 r8:00000002 r7:60000013 r6:eeb55d8c r5:85f14800 r4:85f14800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f14800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb55e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f14800 r7:00000000 r6:83018000 r5:00001000 r4:7fbff000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee981000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605938c r4:86059000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605938c r4:85fbcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f14800 r8:85fbcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcf80 r8:80287e08 r7:eeb51e60 r6:859fd200 r5:85f14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb55fb0 to 0xeeb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb47c0 INFO: task kworker/0:943:8646 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:944:8648 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:944 state:D stack:0 pid:8648 tgid:8648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb59d84 r8:00000002 r7:60000013 r6:eeb59d8c r5:85f15400 r4:85f15400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f15400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f15400 r7:00000000 r6:83018000 r5:00001000 r4:7fc01000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee98d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605b78c r4:8605b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605b78c r4:85e7d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f15400 r8:85e7d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d000 r8:80287e08 r7:eeb51e60 r6:859fd280 r5:85f15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb59fb0 to 0xeeb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4340 INFO: task kworker/0:944:8648 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:8651 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:8651 tgid:8651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb65d84 r8:00000002 r7:60000113 r6:eeb65d8c r5:85f12400 r4:85f12400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f12400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f12400 r7:00000000 r6:83018000 r5:00001000 r4:7fc05000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605c38c r4:8605c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605c38c r4:85e7d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f12400 r8:85e7d0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d080 r8:80287e08 r7:eeb51e60 r6:859fd080 r5:85f12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb65fb0 to 0xeeb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4340 INFO: task kworker/0:945:8651 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:8652 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:946 state:D stack:0 pid:8652 tgid:8652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb69d84 r8:00000002 r7:60000013 r6:eeb69d8c r5:85f13000 r4:85f13000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f13000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f13000 r7:00000000 r6:83018000 r5:00001000 r4:7fc0d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605db8c r4:8605d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605db8c r4:85e7d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f13000 r8:85e7d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d100 r8:80287e08 r7:eeb65e60 r6:859fd100 r5:85f13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb69fb0 to 0xeeb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:946:8652 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:8653 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:8653 tgid:8653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb6dd84 r8:00000002 r7:60000113 r6:eeb6dd8c r5:85f16000 r4:85f16000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f16000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4e00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f16000 r7:00000000 r6:83018000 r5:00001000 r4:7fc07000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9bd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605cb8c r4:8605c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605cb8c r4:85e7d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f16000 r8:85e7d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d180 r8:80287e08 r7:eeb69e60 r6:85e81000 r5:85f16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb6dfb0 to 0xeeb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4f00 INFO: task kworker/0:947:8653 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:8655 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:8655 tgid:8655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb75d84 r8:00000002 r7:60000013 r6:eeb75d8c r5:85f16c00 r4:85f16c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f16c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f16c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc09000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605d38c r4:8605d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605d38c r4:85e7d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f16c00 r8:85e7d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d200 r8:80287e08 r7:eeb69e60 r6:85e81080 r5:85f16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb75fb0 to 0xeeb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4b40 INFO: task kworker/0:948:8655 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:8657 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:8657 tgid:8657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb7dd84 r8:00000002 r7:60000013 r6:eeb7dd8c r5:85f09800 r4:85f09800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f09800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb7de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e54c00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f09800 r7:00000000 r6:83018000 r5:00001000 r4:7fc0b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9db000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605d78c r4:8605d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605d78c r4:85e7d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f09800 r8:85e7d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d280 r8:80287e08 r7:eeb69e60 r6:85e81100 r5:85f09800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb7dfb0 to 0xeeb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54800 INFO: task kworker/0:949:8657 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:8661 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:8661 tgid:8661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb8dd84 r8:00000002 r7:60000113 r6:eeb8dd8c r5:86089800 r4:86089800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86089800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb8de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa70c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86089800 r7:00000000 r6:83018000 r5:00001000 r4:7fc0f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605df8c r4:8605dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605df8c r4:85e7d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86089800 r8:85e7d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d300 r8:80287e08 r7:eeb69e60 r6:85e81180 r5:86089800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb8dfb0 to 0xeeb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7440 INFO: task kworker/0:950:8661 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:8663 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:8663 tgid:8663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb95d84 r8:00000002 r7:60000113 r6:eeb95d8c r5:86088000 r4:86088000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86088000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb95e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86088000 r7:00000000 r6:83018000 r5:00001000 r4:7fc11000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea05000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605e78c r4:8605e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605e78c r4:85e7d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86088000 r8:85e7d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d380 r8:80287e08 r7:eeb8de60 r6:85e81200 r5:86088000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb95fb0 to 0xeeb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54c80 INFO: task kworker/0:951:8663 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:8664 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:8664 tgid:8664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb99d84 r8:00000002 r7:60000113 r6:eeb99d8c r5:86088c00 r4:86088c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86088c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa75c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86088c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc13000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea17000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605c78c r4:8605c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605c78c r4:85e7d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86088c00 r8:85e7d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d400 r8:80287e08 r7:eeb95e60 r6:85e81280 r5:86088c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb99fb0 to 0xeeb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54c80 INFO: task kworker/0:952:8664 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:8667 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:8667 tgid:8667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebadd84 r8:00000002 r7:60000113 r6:eebadd8c r5:8608c800 r4:8608c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608c800 r7:00000000 r6:83018000 r5:00001000 r4:7fc21000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebf3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605cf8c r4:8605cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605cf8c r4:85e7d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608c800 r8:85e7d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d480 r8:80287e08 r7:eeb99e60 r6:85e81300 r5:8608c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebadfb0 to 0xeebadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:953:8667 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:954:8668 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:954 state:D stack:0 pid:8668 tgid:8668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebb1d84 r8:00000002 r7:60000113 r6:eebb1d8c r5:8608d400 r4:8608d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608d400 r7:00000000 r6:83018000 r5:00001000 r4:7fc15000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb9f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605eb8c r4:8605e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605eb8c r4:85e7d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608d400 r8:85e7d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d500 r8:80287e08 r7:eebade60 r6:85e81380 r5:8608d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebb1fb0 to 0xeebb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:954:8668 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:8669 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:8669 tgid:8669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebb9d84 r8:00000002 r7:60000113 r6:eebb9d8c r5:8608b000 r4:8608b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608b000 r7:00000000 r6:83018000 r5:00001000 r4:7fc17000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeba5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ef8c r4:8605ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ef8c r4:85e7d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608b000 r8:85e7d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d580 r8:80287e08 r7:eebade60 r6:85e81400 r5:8608b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebb9fb0 to 0xeebb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45080 INFO: task kworker/0:955:8669 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:8671 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:956 state:D stack:0 pid:8671 tgid:8671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebc9d84 r8:00000002 r7:60000113 r6:eebc9d8c r5:8608e000 r4:8608e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebc9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608e000 r7:00000000 r6:83018000 r5:00001000 r4:7fc19000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebbf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605f38c r4:8605f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605f38c r4:85e7d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608e000 r8:85e7d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d780 r8:80287e08 r7:eebade60 r6:85e81480 r5:8608e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebc9fb0 to 0xeebc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:956:8671 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:8673 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:8673 tgid:8673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebd5d84 r8:00000002 r7:60000113 r6:eebd5d8c r5:8608bc00 r4:8608bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebd5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e455c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fc1b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebc5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605f78c r4:8605f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605f78c r4:85e7d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608bc00 r8:85e7d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d600 r8:80287e08 r7:eebade60 r6:85e81500 r5:8608bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebd5fb0 to 0xeebd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e456c0 INFO: task kworker/0:957:8673 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:8676 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:8676 tgid:8676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebe9d84 r8:00000002 r7:60000113 r6:eebe9d8c r5:85f10c00 r4:85f10c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f10c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebe9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f10c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc1d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebdb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605fb8c r4:8605f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605fb8c r4:85e7d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f10c00 r8:85e7d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d680 r8:80287e08 r7:eebade60 r6:85e81580 r5:85f10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebe9fb0 to 0xeebe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45680 INFO: task kworker/0:958:8676 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:8677 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:8677 tgid:8677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebf1d84 r8:00000002 r7:60000013 r6:eebf1d8c r5:8608a400 r4:8608a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebf1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608a400 r7:00000000 r6:83018000 r5:00001000 r4:7fc1f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebe1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ff8c r4:8605fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ff8c r4:85e7d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608a400 r8:85e7d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d700 r8:80287e08 r7:eebade60 r6:85e81600 r5:8608a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebf1fb0 to 0xeebf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e457c0 INFO: task kworker/0:959:8677 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:8680 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:8680 tgid:8680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eec05d84 r8:00000002 r7:60000113 r6:eec05d8c r5:86090000 r4:86090000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86090000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eec05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86090000 r7:00000000 r6:83018000 r5:00001000 r4:7fc25000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eec0f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8606038c r4:86060000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8606038c r4:85e7d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86090000 r8:85e7d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d800 r8:80287e08 r7:eebade60 r6:85e81680 r5:86090000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeec05fb0 to 0xeec05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45840 INFO: task kworker/0:960:8680 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:8682 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:8682 tgid:8682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eec0dd84 r8:00000002 r7:60000113 r6:eec0dd8c r5:86091800 r4:86091800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86091800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eec0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45ac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86091800 r7:00000000 r6:83018000 r5:00001000 r4:7fc23000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebf9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605bf8c r4:8605bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605bf8c r4:85e7d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86091800 r8:85e7d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d880 r8:80287e08 r7:eec05e60 r6:85e81700 r5:86091800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeec0dfb0 to 0xeec0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e459c0 INFO: task kworker/0:961:8682 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:963:8690 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:963 state:D stack:0 pid:8690 tgid:8690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebe5d84 r8:00000002 r7:60000113 r6:eebe5d8c r5:86093000 r4:86093000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86093000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebe5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e47280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86093000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb11000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8606078c r4:86060400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8606078c r4:85e7d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86093000 r8:85e7d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d980 r8:80287e08 r7:eec19e60 r6:85e81800 r5:86093000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebe5fb0 to 0xeebe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45d00 INFO: task kworker/0:963:8690 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000d0013 r5:600d0093 r4:82257d0c [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220048>] (dump_stack) from [<81a3cd0c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3cbac>] (nmi_cpu_backtrace) from [<81a3ce58>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3cd28>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:00019892 r8:82ab6564 r7:8280c788 r6:0000777c r5:8281b4c8 r4:86075d0c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<8038690c>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038690c r7:83348780 r6:83348780 r5:83251800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b500 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5bf2c>] lr : [<80a6292c>] psr: 60090113 sp : ebc39eb0 ip : ebc39ec0 fp : ebc39ebc r10: 8295b3bc r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000ec3b r2 : 00000000 r1 : 60090113 r0 : 8440a840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 846a5640 DAC: fffffffd Call trace: [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6290c>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:83a63000 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:8454b280 r6:8454b280 r5:83a63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84070d00