Extracting prog: 16m50.971494575s Minimizing prog: 1h58m11.657600482s Simplifying prog options: 0s Extracting C: 9m0.282716703s Simplifying C: 59m11.584710707s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 5m0s testing program (duration=5m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h23m14.496562586s repro crashed as (corrupted=false): INFO: task kworker/1:2:50 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:50 tgid:50 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df92dd84 r8:00000002 r7:60000113 r6:df92dd8c r5:8390b000 r4:8390b000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8390b000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df92de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85468480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8390b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeed000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b4f8c r4:855b4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b4f8c r4:8381b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8390b000 r8:8381b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8381b000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8381b000 r8:80287e08 r7:df921e60 r6:8381b080 r5:8390b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf92dfb0 to 0xdf92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:83816c40 INFO: task kworker/1:2:50 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8029ce10>] (preempt_count_sub) from [<81a53dc8>] (preempt_schedule_irq+0x4c/0xa8 kernel/sched/core.c:7092) [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: ba3a2000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:2:3100 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3100 tgid:3100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df95dd84 r8:00000002 r7:60000113 r6:df95dd8c r5:83feec00 r4:83feec00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83feec00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83feec00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e40b8c r4:85e40800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e40b8c r4:849c0b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83feec00 r8:849c0bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0b80 r8:80287e08 r7:df83de60 r6:849c0a80 r5:83feec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf95dfb0 to 0xdf95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849e0e00 INFO: task kworker/0:2:3100 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bb902000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/1:3:3116 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df999d84 r8:00000002 r7:60000013 r6:df999d8c r5:84118c00 r4:84118c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84118c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df999e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8410dc00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84118c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b8638c r4:84b86000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b8638c r4:838e1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84118c00 r8:838e1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1c00 r8:80287e08 r7:df92de60 r6:849c0880 r5:84118c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf999fb0 to 0xdf999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844e08c0 INFO: task kworker/1:3:3116 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bbdcd000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:4:3120 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:8411b000 r4:8411b000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411b000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844dd8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8411b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be678c r4:84be6400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be678c r4:849c0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411b000 r8:849c0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0d80 r8:80287e08 r7:df83de60 r6:849c0e00 r5:8411b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dda00 INFO: task kworker/0:4:3120 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bbdcd000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:5:3122 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:8411d400 r4:8411d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8411d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be4b8c r4:84be4800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be4b8c r4:849c0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411d400 r8:849c0eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0e80 r8:80287e08 r7:df98de60 r6:849c0980 r5:8411d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dd8c0 INFO: task kworker/0:5:3122 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bc11f000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/1:4:3123 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83908c00 r4:83908c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83908c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a4080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523d78c r4:8523d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8523d78c r4:838e1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83908c00 r8:838e1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1c80 r8:80287e08 r7:df999e60 r6:838e1b00 r5:83908c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844e0780 INFO: task kworker/1:4:3123 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bc546000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/1:5:3124 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:84461800 r4:84461800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84461800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84461800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513e38c r4:8513e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513e38c r4:838e1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84461800 r8:838e1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1b80 r8:80287e08 r7:df9d1e60 r6:838e1880 r5:84461800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844e0780 INFO: task kworker/1:5:3124 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bcc4c000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:6:3127 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:84463000 r4:84463000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84463000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4a7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84463000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be478c r4:84be4400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be478c r4:849c0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84463000 r8:849c0f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0f00 r8:80287e08 r7:df98de60 r6:838e1800 r5:84463000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844ddcc0 INFO: task kworker/0:6:3127 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bcc4c000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:7:3128 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84466000 r4:84466000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84466000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a67c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84466000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4931000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84be4f8c r4:84be4c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84be4f8c r4:849c0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84466000 r8:849c0a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0a00 r8:80287e08 r7:df9e9e60 r6:838e1780 r5:84466000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dde80 INFO: task kworker/0:7:3128 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bd01a000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 INFO: task kworker/0:8:3130 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:84462400 r4:84462400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84462400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85104580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84462400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844d938c r4:844d9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d938c r4:849c0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84462400 r8:849c082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0800 r8:80287e08 r7:df9f5e60 r6:838e1700 r5:84462400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844ddec0 INFO: task kworker/0:8:3130 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bd225000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3132 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:84464800 r4:84464800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84464800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997100 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84464800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0551000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516838c r4:85168000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516838c r4:84219000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84464800 r8:8421902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84219000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84219000 r8:80287e08 r7:df9fde60 r6:838e1680 r5:84464800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dd500 INFO: task kworker/0:9:3132 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bd677000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:84465400 r4:84465400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84465400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f8b40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84465400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e899b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844d9f8c r4:844d9c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844d9f8c r4:84211f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84465400 r8:84211fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84211f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84211f80 r8:80287e08 r7:dfa09e60 r6:838e1600 r5:84465400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dd240 INFO: task kworker/0:10:3134 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bdb90000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3138 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:84119800 r4:84119800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84119800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509a000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84119800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c5f8c r4:851c5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c5f8c r4:845cf300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84119800 r8:845cf32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845cf300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf300 r8:80287e08 r7:dfa09e60 r6:845cf080 r5:84119800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844ddec0 INFO: task kworker/0:11:3138 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: be061000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000013 r6:dfa41d8c r5:84118000 r4:84118000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84118000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509a240 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84118000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c6f8c r4:851c6c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c6f8c r4:849c0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84118000 r8:849c072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0700 r8:80287e08 r7:df9c5e60 r6:849c0780 r5:84118000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a080 INFO: task kworker/0:12:3140 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: be061000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:8411e000 r4:8411e000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411e000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85460840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8411e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85418b8c r4:85418800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85418b8c r4:849c0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411e000 r8:849c0d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c0d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c0d00 r8:80287e08 r7:dfa41e60 r6:849c0f80 r5:8411e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a080 INFO: task kworker/0:13:3142 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: be213000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3143 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:8411a400 r4:8411a400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411a400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c7540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8411a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d338c r4:852d3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d338c r4:838e1500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411a400 r8:838e152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1500 r8:80287e08 r7:df9d1e60 r6:845cf280 r5:8411a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cd480 INFO: task kworker/1:6:3143 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: be213000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:8411c800 r4:8411c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a41f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8411c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac51000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afcf8c r4:84afcc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afcf8c r4:845cf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411c800 r8:845cf02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845cf000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845cf000 r8:80287e08 r7:dfa49e60 r6:84407480 r5:8411c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a040 INFO: task kworker/0:14:3144 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bec81000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3146 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:841b8000 r4:841b8000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b8000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578b040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b7b8c r4:855b7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b7b8c r4:838e1300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b8000 r8:838e132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1300 r8:80287e08 r7:dfa55e60 r6:84407400 r5:841b8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cd540 INFO: task kworker/1:7:3146 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bec81000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3150 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:841bc800 r4:841bc800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841bc800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cdf00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855b6b8c r4:855b6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855b6b8c r4:838e1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841bc800 r8:838e15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1580 r8:80287e08 r7:dfa69e60 r6:84163d00 r5:841bc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cd740 INFO: task kworker/1:8:3150 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf02d000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df995d84 r8:00000002 r7:60000113 r6:df995d8c r5:841bb000 r4:841bb000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841bb000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df995e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:841bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa25000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530f78c r4:8530f400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8530f78c r4:83348100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841bb000 r8:8334812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83348100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348100 r8:80287e08 r7:dfa49e60 r6:84418a80 r5:841bb000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf995fb0 to 0xdf995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a8c0 INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf02d000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:841bec00 r4:841bec00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841bec00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85444680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:841bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852eff8c r4:852efc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852eff8c r4:84418d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841bec00 r8:84418dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84418d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84418d80 r8:80287e08 r7:dfa49e60 r6:84418a00 r5:841bec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a840 INFO: task kworker/0:16:3152 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf515000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:841b8c00 r4:841b8c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b8c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2b580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:841b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854e078c r4:854e0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e078c r4:83348080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b8c00 r8:833480ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83348080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83348080 r8:80287e08 r7:dfa49e60 r6:838b4600 r5:841b8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a840 INFO: task kworker/0:17:3155 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf515000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3157 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83935400 r4:83935400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83935400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85117800 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83935400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8983000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854dc38c r4:854dc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dc38c r4:84418d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83935400 r8:84418d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84418d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84418d00 r8:80287e08 r7:dfa5de60 r6:832c6980 r5:83935400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a740 INFO: task kworker/0:18:3157 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf515000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3159 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83b06000 r4:83b06000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b06000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545e040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b06000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb653000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afe38c r4:84afe000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afe38c r4:842ec100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06000 r8:842ec12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:842ec100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842ec100 r8:80287e08 r7:dfa5de60 r6:842ec180 r5:83b06000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482a840 INFO: task kworker/0:19:3159 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf7ad000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83b03c00 r4:83b03c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b03c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b51000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb141000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852efb8c r4:852ef800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852efb8c r4:838b4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b03c00 r8:838b46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:838b4680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838b4680 r8:80287e08 r7:dfa99e60 r6:830cc400 r5:83b03c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8482afc0 INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf9ac000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:83b00c00 r4:83b00c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85122dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e496f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c238c r4:854c2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c238c r4:84444000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:8444402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444000 r8:80287e08 r7:dfaa1e60 r6:84444200 r5:83b00c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84442180 INFO: task kworker/0:21:3164 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bf9ac000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83b06c00 r4:83b06c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b06c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4338c r4:85e43000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4338c r4:84444100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06c00 r8:8444412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444100 r8:80287e08 r7:dfaade60 r6:84444180 r5:83b06c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844420c0 INFO: task kworker/0:22:3165 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bfbea000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3166 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83252400 r4:83252400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a08000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df90f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b1c78c r4:85b1c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b1c78c r4:84444080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:844440ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444080 r8:80287e08 r7:dfa85e60 r6:84444280 r5:83252400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84442100 INFO: task kworker/0:23:3166 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: bfbea000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83256000 r4:83256000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83256000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c19c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83256000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb87000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484178c r4:84841400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484178c r4:838e1d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83256000 r8:838e1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1d00 r8:80287e08 r7:dfa69e60 r6:84444300 r5:83256000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cd940 INFO: task kworker/1:9:3170 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0059000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3172 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83256c00 r4:83256c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83256c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85792380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83256c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb651000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cc38c r4:857cc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cc38c r4:838e1280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83256c00 r8:838e12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1280 r8:80287e08 r7:dfadde60 r6:84444380 r5:83256c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cdec0 INFO: task kworker/1:10:3172 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c016a000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3174 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83254800 r4:83254800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83254800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582a740 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83254800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd47000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85667f8c r4:85667c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85667f8c r4:83813b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83254800 r8:83813bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83813b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83813b80 r8:80287e08 r7:dfadde60 r6:84444400 r5:83254800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cdbc0 INFO: task kworker/1:11:3174 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c05af000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3176 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:83b28000 r4:83b28000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b28000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85863f40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b28000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484238c r4:84842000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484238c r4:838e1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b28000 r8:838e102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1000 r8:80287e08 r7:dfaf1e60 r6:84444480 r5:83b28000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cdbc0 INFO: task kworker/1:12:3176 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c05af000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3177 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:8324a400 r4:8324a400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8324a400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858dfd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484078c r4:84840400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484078c r4:838e1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8324a400 r8:838e1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838e1f00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e1f00 r8:80287e08 r7:dfb01e60 r6:84444500 r5:8324a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849cd940 INFO: task kworker/1:13:3177 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0723000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3180 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000013 r6:dfb1dd8c r5:83255400 r4:83255400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83255400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2e80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83255400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b278c r4:859b2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b278c r4:84441000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83255400 r8:8444102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441000 r8:80287e08 r7:dfb09e60 r6:84444580 r5:83255400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447040 INFO: task kworker/1:14:3180 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0987000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3183 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83fee000 r4:83fee000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83fee000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a2e00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83fee000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b238c r4:859b2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b238c r4:84441280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83fee000 r8:844412ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441280 r8:80287e08 r7:dfb1de60 r6:84444600 r5:83fee000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447180 INFO: task kworker/1:15:3183 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0987000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3184 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83249800 r4:83249800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83249800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fcb00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83249800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc85000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8592a38c r4:8592a000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592a38c r4:84441080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83249800 r8:844410ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441080 r8:80287e08 r7:dfb35e60 r6:84444680 r5:83249800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447380 INFO: task kworker/1:16:3184 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0f03000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3186 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83fed400 r4:83fed400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83fed400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c31000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83fed400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b1cf8c r4:85b1cc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1cf8c r4:84441380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83fed400 r8:844413ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441380 r8:80287e08 r7:dfb39e60 r6:84444700 r5:83fed400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447440 INFO: task kworker/1:17:3186 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c0f03000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83244800 r4:83244800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a94ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaaf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b1038c r4:85b10000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1038c r4:84441100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:8444112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441100 r8:80287e08 r7:dfb49e60 r6:84444780 r5:83244800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447600 INFO: task kworker/1:18:3187 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c13a5000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:8324d400 r4:8324d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8324d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c02480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8324d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b1ff8c r4:85b1fc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1ff8c r4:84441480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8324d400 r8:844414ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441480 r8:80287e08 r7:dfb49e60 r6:84444800 r5:8324d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447440 INFO: task kworker/1:19:3189 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c13a5000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3191 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:843e0c00 r4:843e0c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e0c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c21900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:843e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed07b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c47f8c r4:85c47c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c47f8c r4:84444880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e0c00 r8:844448ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444880 r8:80287e08 r7:dfa85e60 r6:84444a00 r5:843e0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84442880 INFO: task kworker/0:24:3191 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1600000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3193 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:843e0000 r4:843e0000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e0000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558e080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb819000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84845b8c r4:84845800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84845b8c r4:84441300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e0000 r8:8444132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441300 r8:80287e08 r7:dfb49e60 r6:84444900 r5:843e0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844479c0 INFO: task kworker/1:20:3193 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c17c3000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:843e1800 r4:843e1800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e1800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84270900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84846f8c r4:84846c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84846f8c r4:84441180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e1800 r8:844411ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441180 r8:80287e08 r7:dfb71e60 r6:84444980 r5:843e1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447bc0 INFO: task kworker/1:21:3195 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c19b3000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:843e2400 r4:843e2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca538c r4:85ca5000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ca538c r4:84441580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e2400 r8:844415ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441580 r8:80287e08 r7:dfb85e60 r6:84444a80 r5:843e2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447c80 INFO: task kworker/1:22:3197 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c1c9c000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3200 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:843e4800 r4:843e4800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e4800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27780 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:843e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf29000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e41b8c r4:85e41800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e41b8c r4:84444b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e4800 r8:84444b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444b00 r8:80287e08 r7:dfa85e60 r6:84444c80 r5:843e4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:846a6240 INFO: task kworker/0:25:3200 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c20e3000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3201 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:843e3c00 r4:843e3c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e3c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dada40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb7b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca5f8c r4:85ca5c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ca5f8c r4:84441780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e3c00 r8:844417ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441780 r8:80287e08 r7:dfb85e60 r6:84444b80 r5:843e3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447e00 INFO: task kworker/1:23:3201 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2136000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3203 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:843e3000 r4:843e3000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e3000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85daf140 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec933000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca6b8c r4:85ca6800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ca6b8c r4:84441800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e3000 r8:8444182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441800 r8:80287e08 r7:dfb85e60 r6:84444c00 r5:843e3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84447f40 INFO: task kworker/1:24:3203 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c267a000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3205 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:843e5400 r4:843e5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843e5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:843e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f1a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed317000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8838c r4:85d88000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d8838c r4:84441700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843e5400 r8:8444172c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441700 r8:80287e08 r7:dfb85e60 r6:84444d00 r5:843e5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84442880 INFO: task kworker/1:25:3205 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c267a000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3207 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000013 r6:dfbcdd8c r5:83ad6000 r4:83ad6000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ad6000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f1a1000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed213000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484c38c r4:8484c000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484c38c r4:84441400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ad6000 r8:8444142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441400 r8:80287e08 r7:dfb85e60 r6:84444d80 r5:83ad6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84442d40 INFO: task kworker/1:26:3207 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c29c3000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3209 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84460c00 r4:84460c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84460c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84270340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84460c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec719000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484d38c r4:8484d000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484d38c r4:84441680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84460c00 r8:844416ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441680 r8:80287e08 r7:dfb85e60 r6:84441980 r5:84460c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270140 INFO: task kworker/1:27:3209 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2cb3000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3212 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84466c00 r4:84466c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84466c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e7d380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84466c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfcb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484738c r4:84847000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484738c r4:84441a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84466c00 r8:84441aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441a80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441a80 r8:80287e08 r7:dfb85e60 r6:84441b00 r5:84466c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842701c0 INFO: task kworker/1:28:3212 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c2ee2000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3213 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:8411bc00 r4:8411bc00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8411bc00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84270640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8411bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84847b8c r4:84847800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84847b8c r4:84441900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8411bc00 r8:8444192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441900 r8:80287e08 r7:dfbd9e60 r6:84441880 r5:8411bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270100 INFO: task kworker/1:29:3213 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c30ba000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3216 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:83b43c00 r4:83b43c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b43c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e7df00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca7b8c r4:85ca7800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ca7b8c r4:84441c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b43c00 r8:84441cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441c80 r8:80287e08 r7:dfbd9e60 r6:84441b80 r5:83b43c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270580 INFO: task kworker/1:30:3216 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c32e8000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3218 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:83b0c800 r4:83b0c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e7d880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84840f8c r4:84840c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84840f8c r4:84441e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0c800 r8:84441e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441e00 r8:80287e08 r7:dfbf5e60 r6:84441d00 r5:83b0c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270680 INFO: task kworker/1:31:3218 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3470000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3220 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc09d84 r8:00000002 r7:60000013 r6:dfc09d8c r5:83b0a400 r4:83b0a400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0a400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83b0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f143000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484c78c r4:8484c400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484c78c r4:84441a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0a400 r8:84441a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441a00 r8:80287e08 r7:dfbf5e60 r6:84441d80 r5:83b0a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270580 INFO: task kworker/1:32:3220 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c36fa000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3222 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84120000 r4:84120000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84120000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84120000 r7:00000000 r6:83018200 r5:00001000 r4:7f19f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed987000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484f38c r4:8484f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484f38c r4:84441f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84120000 r8:84441fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441f80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441f80 r8:80287e08 r7:dfc09e60 r6:84441600 r5:84120000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842709c0 INFO: task kworker/1:33:3222 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3930000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3224 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84124800 r4:84124800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84124800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ed4ec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84124800 r7:00000000 r6:83018200 r5:00001000 r4:7f123000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484e78c r4:8484e400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484e78c r4:84441200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84124800 r8:8444122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441200 r8:80287e08 r7:dfc15e60 r6:84441e80 r5:84124800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:842709c0 INFO: task kworker/1:34:3224 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c39ac000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3226 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:841b0c00 r4:841b0c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b0c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f183000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed90b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484df8c r4:8484dc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484df8c r4:84441500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b0c00 r8:8444152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84441500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84441500 r8:80287e08 r7:dfc1de60 r6:84441f00 r5:841b0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270c80 INFO: task kworker/1:35:3226 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3b9e000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3228 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:841b0000 r4:841b0000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b0000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ed42c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f143000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484e38c r4:8484e000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484e38c r4:84a38080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b0000 r8:84a380ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38080 r8:80287e08 r7:dfc1de60 r6:84a38000 r5:841b0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270e00 INFO: task kworker/1:36:3228 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c3d2e000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3229 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:841b1800 r4:841b1800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b1800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858563c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f12b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85979b8c r4:85979800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85979b8c r4:84a38100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b1800 r8:84a3812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38100 r8:80287e08 r7:dfc1de60 r6:84a38180 r5:841b1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84270f00 INFO: task kworker/1:37:3229 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4087000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3232 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:841b5400 r4:841b5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859977c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f181000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed905000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484ef8c r4:8484ec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484ef8c r4:84a38400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b5400 r8:84a3842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38400 r8:80287e08 r7:dfac1e60 r6:84a38480 r5:841b5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a2c140 INFO: task kworker/1:38:3232 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4087000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3234 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:841b6c00 r4:841b6c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841b6c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858097c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:841b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f229000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb55000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b8bf8c r4:85b8bc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b8bf8c r4:84a38300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841b6c00 r8:84a3832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38300 r8:80287e08 r7:dfc3de60 r6:84a38580 r5:841b6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a2c2c0 INFO: task kworker/1:39:3234 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4889000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3236 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:844f0000 r4:844f0000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f0000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f12b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8484d78c r4:8484d400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8484d78c r4:84a38680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f0000 r8:84a386ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38680 r8:80287e08 r7:dfc51e60 r6:84a38700 r5:844f0000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a2c440 INFO: task kworker/1:40:3236 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4889000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3242 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:844f1800 r4:844f1800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f1800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4238c r4:85e42000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4238c r4:830cc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f1800 r8:830cc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc380 r8:80287e08 r7:dfa85e60 r6:84a38800 r5:844f1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:844dd0c0 INFO: task kworker/0:26:3242 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4889000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3244 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:844f2400 r4:844f2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27a80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfad000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e42b8c r4:85e42800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e42b8c r4:84444e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f2400 r8:84444e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84444e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84444e00 r8:80287e08 r7:dfa85e60 r6:84a38880 r5:844f2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84807ac0 INFO: task kworker/0:27:3244 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4889000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3246 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:844f3000 r4:844f3000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f3000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85809bc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f22b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb5f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9678c r4:85d96400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9678c r4:84a38600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f3000 r8:84a3862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38600 r8:80287e08 r7:dfc51e60 r6:84a38780 r5:844f3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a2cbc0 INFO: task kworker/1:41:3246 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4fd6000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:844f3c00 r4:844f3c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f3c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e20900 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb65000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abc38c r4:85abc000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abc38c r4:84a38380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f3c00 r8:84a383ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a38380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a38380 r8:80287e08 r7:dfa01e60 r6:84a38900 r5:844f3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a2c700 INFO: task kworker/1:42:3247 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4fd6000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3250 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:844f5400 r4:844f5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27d40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e43b8c r4:85e43800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e43b8c r4:84a34080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f5400 r8:84a340ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34080 r8:80287e08 r7:dfa85e60 r6:84a38a00 r5:844f5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04200 INFO: task kworker/0:28:3250 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c4fd6000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3252 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:844f6c00 r4:844f6c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844f6c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e20940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4478c r4:85e44400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4478c r4:84a34000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844f6c00 r8:84a3402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34000 r8:80287e08 r7:dfc75e60 r6:84a38b00 r5:844f6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04140 INFO: task kworker/0:29:3252 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c53a9000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3255 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:84a20c00 r4:84a20c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a20c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e27f00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed063000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d63f8c r4:85d63c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d63f8c r4:84a34280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a20c00 r8:84a342ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34280 r8:80287e08 r7:dfc7de60 r6:84a38b80 r5:84a20c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04540 INFO: task kworker/0:30:3255 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c57d8000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3256 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:84a21800 r4:84a21800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a21800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e39680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a21800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed397000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e46f8c r4:85e46c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e46f8c r4:84a34180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a21800 r8:84a341ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34180 r8:80287e08 r7:dfc7de60 r6:84a38c00 r5:84a21800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04500 INFO: task kworker/0:31:3256 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c5aeb000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3258 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc95d84 r8:00000002 r7:60000113 r6:dfc95d8c r5:84a23000 r4:84a23000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a23000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e39040 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed319000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e44f8c r4:85e44c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e44f8c r4:84a34200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a23000 r8:84a3422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34200 r8:80287e08 r7:dfc8de60 r6:84a38c80 r5:84a23000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04680 INFO: task kworker/0:32:3258 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c5e8b000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3260 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84a23c00 r4:84a23c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a23c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e391c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed34d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4578c r4:85e45400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4578c r4:84a34100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a23c00 r8:84a3412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34100 r8:80287e08 r7:dfc8de60 r6:84a38d00 r5:84a23c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a046c0 INFO: task kworker/0:33:3260 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c620a000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3262 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84a24800 r4:84a24800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a24800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e39340 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed365000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e45f8c r4:85e45c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e45f8c r4:84a34480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a24800 r8:84a344ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34480 r8:80287e08 r7:dfc8de60 r6:84a38d80 r5:84a24800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04900 INFO: task kworker/0:34:3262 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c659c000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3264 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84a22400 r4:84a22400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a22400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e394c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a22400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed383000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4678c r4:85e46400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4678c r4:84a34500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a22400 r8:84a3452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34500 r8:80287e08 r7:dfc8de60 r6:84a38e00 r5:84a22400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04ac0 INFO: task kworker/0:35:3264 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c659c000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3267 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84a26c00 r4:84a26c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a26c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e397c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3bb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4778c r4:85e47400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4778c r4:84a34580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a26c00 r8:84a345ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34580 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34580 r8:80287e08 r7:dfc8de60 r6:84a38e80 r5:84a26c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a049c0 INFO: task kworker/0:36:3267 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6bad000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:84a2f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f480 r8:80287e08 r7:e04d5e60 r6:84b43700 r5:84bc1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84a26000 r4:84a26000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a26000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e39ac0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84a26000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4bb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4878c r4:85e48400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4878c r4:84a34600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a26000 r8:84a3462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a34600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a34600 r8:80287e08 r7:dfcb9e60 r6:84a38f00 r5:84a26000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:84a04dc0 INFO: task kworker/0:37:3270 is blocked on a mutex likely owned by task kworker/0:128:3714. task:kworker/0:128 state:R running task stack:0 pid:3714 tgid:3714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc1800 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84bc1800 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: c6bad000 e003d000 00000001 80239b98 7f119000 00000001 9d40: 82ac15a0 7f119000 e003d000 8280c928 82ac21c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4700 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afa78c r4:84afa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84afa78c r4:84a2f48 <> [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84841b8c r4:84841800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84841b8c r4:8578c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487e000 r8:8578c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8578c200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578c200 r8:80287e08 r7:ebbe9e60 r6:8578c480 r5:8487e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8578b580 INFO: task kworker/1:832:5666 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 9f318000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a3dc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8487ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba85000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84841f8c r4:84841c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84841f8c r4:8578c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487ec00 r8:8578c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8578c380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578c380 r8:80287e08 r7:ebbe9e60 r6:8578c280 r5:8487ec00 r4:8578b4c0 1d60: 80230ad0 80239bb0 80070013 ffffffff [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 task:kworker/0:431 state:D stack:0 pid:5670 tgid:5670 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85666f8c r4:856b6200 r10:61c88647 r9:8487b000 r8:856b622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856b6200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b6200 r8:80287e08 r7:ebd5de60 r6:8578c400 r5:8487b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd81fb0 to 0xebd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85786640 INFO: task kworker/0:431:5670 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 9f5d6000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae7f000 r5:85667b8c r4:85667800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85667b8c r4:85446d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856d8c00 r8:85446dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446d80 r8:80287e08 r7:ebd5de60 r6:8578c500 r5:856d8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc95fb0 to 0xebc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85786940 INFO: task kworker/0:432:5673 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 9f959000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:5675 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd85d84 r8:00000002 r7:60000013 r6:ebd85d8c r5:856e0c00 r4:856e0c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e0c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd85e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85792080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb601000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566638c r4:85666000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566638c r4:856cce00 r10:61c88647 r9:856e0c00 r8:856cce2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04f1d28 to 0xe04f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:5677 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd9dd84 r8:00000002 r7:60000013 r6:ebd9dd8c r5:856e2400 r4:856e2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85786940 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566678c r4:85666400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566678c r4:84b6be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e2400 r8:84b6be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6be00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6be00 r8:80287e08 r7:ebd85e60 r6:8578c600 r5:856e2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd9dfb0 to 0xebd9dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8571a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08 r5:8566778c r4:85667400 r7:dddced80 r6:83018000 r5:8566778c r4:8578d000 r10:00000000 r9:8578d000 r8:80287e08 r7:ebd85e60 r6:8578d080 r5:8571a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd75fb0 to 0xebd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85786e00 INFO: task kworker/0:435:5678 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a0236000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r5:8571bc00 r4:8291a680 r4:00000000 r4:00000000 r5:85664f8c r4:85664c00 r10:61c88647 r9:8571bc00 r8:8578d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85786dc0 Call trace: r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a0236000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:5684 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd7dd84 r8:00000002 r7:60000013 r6:ebd7dd8c r5:8571d400 r4:8571d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd7de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:8571d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:85652b8c r4:85652800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8578d100 r8:80287e08 r7:ebd85e60 r6:8578d400 r5:8571d400 INFO: task kworker/0:437:5684 is blocked on a mutex likely owned by task kworker/0:129:3716. 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:5685 blocked for more than 475 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebda9d84 r8:00000002 r7:60000113 r6:ebda9d8c r5:8571e000 r4:8571e000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571e000 r4:8291a680 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:438:5685 is blocked on a mutex likely owned by task kworker/0:129:3716. r4:e04f1dc0 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04f1fb0 to 0xe04f1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:8571ec00 r4:00000000 r5:857ccb8c r4:857cc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdb1fb0 to 0xebdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85792480 INFO: task kworker/0:439:5688 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a07e9000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5691 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdadd84 r8:00000002 r7:60000013 r6:ebdadd8c r5:8571c800 r4:8571c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdade08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r9:83018005 r8:8571c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:857cdf8c r4:857cdc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8578d580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:440:5691 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a0b32000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84a2f400 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 INFO: task kworker/0:441:5692 blocked for more than 476 seconds. r5:8571b000 r4:8291a680 r4:00000000 r5:857cd78c r4:857cd400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8578d680 r8:80287e08 r7:ebdade60 r6:8578d700 r5:8571b000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857928c0 INFO: task kworker/0:441:5692 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a0c35000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:5695 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdb5d84 r8:00000002 r7:60000013 r6:ebdb5d8c r5:85718000 r4:85718000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85718000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857ce78c r4:857ce400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8578da00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r4:e04f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5697 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdbdd84 r8:00000002 r7:60000013 r6:ebdbdd8c r5:843dbc00 r4:843dbc00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843dbc00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85792c00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:843dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb753000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ccf8c r4:857ccc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ccf8c r4:8578d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:843dbc00 r8:8578d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578d800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578d800 r8:80287e08 r7:ebdb5e60 r6:8578d880 r5:843dbc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85792bc0 INFO: task kworker/0:443:5697 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a1282000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:5698 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:5698 tgid:5698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdc5d84 r8:00000002 r7:60000113 r6:ebdc5d8c r5:856e0000 r4:856e0000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e0000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:857cdb8c r4:857cd800 r4:8578d900 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:82ac21e4 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdd1d84 r8:00000002 r7:60000113 r6:ebdd1d8c r5:856e3000 r4:856e3000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e3000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85792280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cef8c r4:857cec00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cef8c r4:8578dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e3000 r8:8578dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578dc80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578dc80 r8:80287e08 r7:ebdc5e60 r6:8578c700 r5:856e3000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd1fb0 to 0xebdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85792bc0 INFO: task kworker/0:445:5700 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a14ba000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:5702 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdd5d84 r8:00000002 r7:60000113 r6:ebdd5d8c r5:856e5400 r4:856e5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cc78c r4:857cc400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cc78c r4:8578d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e5400 r8:8578d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578d980 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578d980 r8:80287e08 r7:ebdd1e60 r6:8578c780 r5:856e5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd5fb0 to 0xebdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85792f80 INFO: task kworker/0:446:5702 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r4:00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:5703 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdd9d84 r8:00000002 r7:60000113 r6:ebdd9d8c r5:856e3c00 r4:856e3c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e3c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857861c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bf000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ce38c r4:857ce000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ce38c r4:8578db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e3c00 r8:8578db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578db00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578db00 r8:80287e08 r7:ebdd5e60 r6:8578c800 r5:856e3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdd9fb0 to 0xebdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85792fc0 INFO: task kworker/0:447:5703 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a1be1000 e0071000 00000001 80239b98 7f11f000 00000001 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:e04f1dc0 r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:5705 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:5705 tgid:5705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebde1d84 r8:00000002 r7:60000013 r6:ebde1d8c r5:856e4800 r4:856e4800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857cf78c r4:857cf400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a1be1000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:5708 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdedd84 r8:00000002 r7:60000013 r6:ebdedd8c r5:856e6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdede08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857cff8c r4:857cfc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/0:450:5710 blocked for more than 476 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a13c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8487d400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ab000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ceb8c r4:857ce800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ceb8c r4:8578de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487d400 r8:8578deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578de80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578de80 r8:80287e08 r7:ebdd5e60 r6:8578c980 r5:8487d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf5fb0 to 0xebdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857a1280 INFO: task kworker/0:450:5710 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a205c000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:5711 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdc1d84 r8:00000002 r7:60000113 r6:ebdc1d8c r5:843de000 r4:843de000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:843de000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1a00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:843de000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 r5:857d0b8c r4:857d0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:451:5711 is blocked on a mutex likely owned by task kworker/0:129:3716. [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdf1d84 r8:00000002 r7:60000113 r6:ebdf1d8c r5:84960000 r4:84960000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84960000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1600 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cf38c r4:857cf000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857cf38c r4:8578df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84960000 r8:8578dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8578df80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578df80 r8:80287e08 r7:ebdc1e60 r6:8578d280 r5:84960000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebdf1fb0 to 0xebdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857a1280 INFO: task kworker/0:452:5713 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a24ff000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 1fa0: 00000000 00000000 00000000 00000000 r5:84960c00 r4:8291a680 r4:00000000 r5:8565e78c r4:8565e400 r4:856ccd00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:5718 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebdb9d84 r8:00000002 r7:60000113 r6:ebdb9d8c r5:84961800 r4:84961800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84961800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a18c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84961800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:00001000 r4:eba05000 r5:857d078c r4:857d0400 r10:00000000 r9:856cce80 r8:80287e08 r7:ebdc1e60 r6:8578dd80 r5:84961800 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:5720 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec60dd84 r8:00000002 r7:60000113 r6:ec60dd8c r5:84962400 r4:84962400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84962400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec60de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84962400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba97000 r5:857d178c r4:857d1400 r10:61c88647 r9:84962400 r8:857b20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857a1280 r4:00000000 r5:80070013 r4:80239bb0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:5722 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:5722 tgid:5722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec61dd84 r8:00000002 r7:60000113 r6:ec61dd8c r5:84963000 r4:84963000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84963000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1b80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84963000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:eba3f000 r5:857d0f8c r4:857d0c00 dfa0: 00000000 00000000 00000000 00000000 Call trace: r5:80070013 r4:80239bb0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:5724 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84964800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:857d038c r4:857b2100 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a2e28000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:5725 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:84965400 r4:84965400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84965400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af0c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84965400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabd000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d1b8c r4:857d1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d1b8c r4:857b2180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84965400 r8:857b21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2180 r8:80287e08 r7:ec60de60 r6:857b2280 r5:84965400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857a1dc0 INFO: task kworker/0:458:5725 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a31ee000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5727 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec621d84 r8:00000002 r7:60000113 r6:ec621d8c r5:856e8c00 r4:856e8c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e8c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec621e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a3c80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84843f8c r4:84843c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84843f8c r4:8578ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8c00 r8:8578ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8578ca00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8578ca00 r8:80287e08 r7:ebbe9e60 r6:8578ca80 r5:856e8c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857a3bc0 INFO: task kworker/1:834:5727 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a3438000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:5729 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:5729 tgid:5729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:856e9800 r4:856e9800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e9800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af200 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d1f8c r4:857d1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d1f8c r4:857b2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e9800 r8:857b23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2380 r10:00000000 r9:857b2380 r8:80287e08 r7:ec625e60 r6:8578cc00 r5:856e9800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04f1d28 to 0xe04f1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5732 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:856eb000 r4:856eb000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856eb000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857ec38c r4:857ec000 r10:00000000 r9:8578cb00 r8:80287e08 r7:ebbe9e60 r6:8578cb80 r5:856eb000 Exception stack(0xe04f1d28 to 0xe04f1d70) r5:00001000 r4:ecf95000 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2f8c r4:857d2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d2f8c r4:857b2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ea400 r8:857b262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2600 r8:80287e08 r7:ec62de60 r6:8578cd80 r5:856ea400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857af140 INFO: task kworker/0:460:5734 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a3742000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857d238c r4:857d2000 r4:00000001 r4:857af280 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:00000000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:462:5737 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:856ed400 r4:856ed400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ed400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb07000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2b8c r4:857d2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d2b8c r4:857b2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ed400 r8:857b252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2500 r8:80287e08 r7:ec63de60 r6:8578cd00 r5:856ed400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec649fb0 to 0xec649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857af400 INFO: task kworker/0:462:5737 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 1d20: a3dfa000 e0071000 00000001 80239b98 7f11f000 00000001 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec651d84 r8:00000002 r7:60000013 r6:ec651d8c r5:856ec800 r4:856ec800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ec800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d138c r4:857d1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d138c r4:857b2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ec800 r8:857b272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 r4:00000000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d338c r4:857d3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d338c r4:857b2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eec00 r8:857b26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2680 r8:80287e08 r7:ec63de60 r6:8578ce80 r5:856eec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857af3c0 INFO: task kworker/0:464:5740 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a4216000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r5:856e1800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857afbc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3f8c r4:857d3c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d3f8c r4:857b2880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e1800 r8:857b28ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2880 r8:80287e08 r7:ec655e60 r6:8578cf00 r5:856e1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8598af8c r4:8598ac00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3b8c r4:857d3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d3b8c r4:857b2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e6c00 r8:857b292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2900 r8:80287e08 r7:ebc31e60 r6:8578cf80 r5:856e6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857af940 INFO: task kworker/0:466:5745 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:80070013 r4:80239bb0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856f0c00 r8:857b27ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857afc40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d378c r4:857d3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d378c r4:857b2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f1800 r8:857b282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2800 r8:80287e08 r7:ec661e60 r6:85696f00 r5:856f1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857afc80 INFO: task kworker/0:468:5749 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a47df000 e0071000 00000001 80239b98 7f11f000 00000001 r4:82ac21e4 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a2f400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r5:856f0000 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r5:00001000 r4:ecf95000 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:5753 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:5753 tgid:5753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec675d84 r8:00000002 r7:60000013 r6:ec675d8c r5:856f2400 r4:856f2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd680 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d8b8c r4:857d8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d8b8c r4:857b2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f2400 r8:857b2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2a00 r8:80287e08 r7:ec66de60 r6:85808000 r5:856f2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857afe00 INFO: task kworker/0:470:5753 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a4ae2000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856f3000 r8:857b2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r4:849cd2c0 Exception stack(0xe04f1d28 to 0xe04f1d70) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:5758 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec689d84 r8:00000002 r7:60000113 r6:ec689d8c r5:856f5400 r4:856f5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580b400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb79000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d878c r4:857d8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d878c r4:857b2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f5400 r8:857b2cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2c80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2c80 r8:80287e08 r7:ec681e60 r6:85808100 r5:856f5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857a3440 INFO: task kworker/0:472:5758 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a5455000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856f6000 r8:857b2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2c00 r8:80287e08 r7:ec689e60 r6:85808180 r5:856f6000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:857affc0 INFO: task kworker/0:473:5759 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a54f7000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d9b8c r4:857d9800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec695fb0 to 0xec695ff8) r4:8580b140 Call trace: 1d20: a5ab6000 e0071000 00000001 80239b98 7f11f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:5763 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec69dd84 r8:00000002 r7:60000013 r6:ec69dd8c r5:856f4800 r4:856f4800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f4800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580b380 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857da38c r4:857da000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857da38c r4:857b2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84966c00 r8:857b2dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2d80 r8:80287e08 r7:ec689e60 r6:857b2e80 r5:84966c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8580b2c0 INFO: task kworker/0:476:5765 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 1d60: 80230ad0 80239bb0 80070013 ffffffff [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:477:5768 blocked for more than 476 seconds. [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:84966000 r8:857b2f2c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r4:82ac21e4 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec6a9d84 r8:00000002 r7:60000113 r6:ec6a9d8c r5:844a0000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8580b440 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 INFO: task kworker/0:479:5772 blocked for more than 476 seconds. [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe04f1d28 to 0xe04f1d70) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:5775 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:5775 tgid:5775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:844a2400 r4:844a2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580bc80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857daf8c r4:857dac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857daf8c r4:85811180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a2400 r8:858111ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811180 r8:80287e08 r7:ec6a9e60 r6:85811300 r5:844a2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec629fb0 to 0xec629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/0:481:5777 blocked for more than 476 seconds. r5:844a3000 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844a3000 r8:858112ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r5:00001000 r4:ecf95000 r4:84a2f400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:5779 blocked for more than 476 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b5d84 r8:00000002 r7:60000113 r6:ec6b5d8c r5:844a3c00 r4:844a3c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a3c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858191c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e038c r4:857e0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e038c r4:85811400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a3c00 r8:8581142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811400 r8:80287e08 r7:ec6b1e60 r6:85811500 r5:844a3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b5fb0 to 0xec6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8580bdc0 INFO: task kworker/0:482:5779 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a70e6000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:483:5780 blocked for more than 476 seconds. task:kworker/0:483 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:844a4800 r4:844a4800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a4800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580bf40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857db38c r4:857db000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857db38c r4:85811100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a4800 r8:8581112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811100 r8:80287e08 r7:ec6b5e60 r6:85811600 r5:844a4800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8580b500 INFO: task kworker/0:483:5780 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a70e6000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 task:kworker/0:484 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:844a5400 r4:844a5400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a5400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d8f8c r4:857d8c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d8f8c r4:85811700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a5400 r8:8581172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811700 r8:80287e08 r7:ec6b5e60 r6:85811780 r5:844a5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858192c0 INFO: task kworker/0:484:5784 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a746f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ecf95000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r5:844a6000 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:844a6000 r8:8581122c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec6c5fb0 to 0xec6c5ff8) task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:5787 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c9d84 r8:00000002 r7:60000113 r6:ec6c9d8c r5:844a6c00 r4:844a6c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc49000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e138c r4:857e1000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e138c r4:85811a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6c00 r8:85811a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811a00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811a00 r8:80287e08 r7:ec6c5e60 r6:85811900 r5:844a6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c9fb0 to 0xec6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819340 INFO: task kworker/0:486:5787 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d20: a7b8c000 e0071000 00000001 80239b98 7f11f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec6d1d84 r8:00000002 r7:60000013 r6:ec6d1d8c r5:844a0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819880 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e1b8c r4:857e1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844a0c00 r8:858114ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85811480 r8:80287e08 r7:ec6c9e60 r6:85811980 r5:844a0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a7b8c000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:5790 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:856e8000 r4:856e8000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e8000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e078c r4:857e0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e078c r4:85811b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8000 r8:85811b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811b00 r8:80287e08 r7:ec6d1e60 r6:85808300 r5:856e8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d9fb0 to 0xec6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819740 INFO: task kworker/0:488:5790 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a82e9000 e0071000 00000001 80239b98 7f11f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:5793 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f5d84 r8:00000002 r7:60000013 r6:ec6f5d8c r5:856f6c00 r4:856f6c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f6c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858199c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc73000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e178c r4:857e1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e178c r4:85811680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f6c00 r8:858116ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811680 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811680 r8:80287e08 r7:ec6d1e60 r6:85808480 r5:856f6c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819840 INFO: task kworker/0:489:5793 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a8336000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 INFO: task kworker/0:490:5794 blocked for more than 477 seconds. [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856ee000 r8:8581182c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xe04f1d28 to 0xe04f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:5796 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec705d84 r8:00000002 r7:60000113 r6:ec705d8c r5:856f8c00 r4:856f8c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f8c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e278c r4:857e2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r4:00000000 r5:8598af8c r4:8598ac00 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:5798 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:856f8000 r4:856f8000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f8000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85819cc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e2b8c r4:857e2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e2b8c r4:85811c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f8000 r8:85811c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811c00 r8:80287e08 r7:ec705e60 r6:85808500 r5:856f8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819bc0 INFO: task kworker/0:492:5798 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a8a7f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r4:e04f1dc0 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) Exception stack(0xe04f1fb0 to 0xe04f1ff8) task:kworker/0:493 state:D stack:0 pid:5800 tgid:5800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856f9800 r8:858118ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819e40 INFO: task kworker/0:493:5800 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a8e96000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:856fbc00 r4:8291a680 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:857e378c r4:85811f00 r10:00000000 r9:85811f00 r8:80287e08 r7:ec715e60 r6:85808680 r5:856fbc00 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:5805 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd91d84 r8:00000002 r7:60000113 r6:ebd91d8c r5:856fc800 r4:856fc800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fc800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd91e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582f200 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e338c r4:857e3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e338c r4:85811d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fc800 r8:85811dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811d80 r8:80287e08 r7:ebc81e60 r6:85808800 r5:856fc800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd91fb0 to 0xebd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85819040 INFO: task kworker/0:495:5805 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 1d20: a90f2000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856fa400 r8:85811fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r5:80070013 r4:80239bb0 r5:00001000 r4:ecf95000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:857e0f8c r4:85811e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fec00 r8:85811eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811e80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811e80 r8:80287e08 r7:ebd91e60 r6:85808780 r5:856fec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8582f040 INFO: task kworker/0:497:5809 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: a9892000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:498 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582f500 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 r5:8598af8c r4:8598ac00 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:85700c00 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582f580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857dbb8c r4:857db800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbb8c r4:85811b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85700c00 r8:85811bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811b80 r8:80287e08 r7:ec73de60 r6:85808900 r5:85700c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8582f440 INFO: task kworker/0:499:5815 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: aa3c7000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:8598af8c r4:8598ac00 r4:84a2f400 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xec74dfb0 to 0xec74dff8) task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000113 r6:ec755d8c r5:85703000 r4:85703000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85703000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582f7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85703000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e838c r4:857e8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e838c r4:8583a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85703000 r8:8583a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a080 r8:80287e08 r7:ec74de60 r6:85808600 r5:85703000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8582f980 INFO: task kworker/0:501:5818 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: aaaf3000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 INFO: task kworker/0:502:5820 blocked for more than 477 seconds. [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857e9f8c r4:857e9c00 r10:61c88647 r9:85700000 r8:8583a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: aacd2000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:5821 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:5821 tgid:5821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000013 r6:ec761d8c r5:85702400 r4:85702400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85702400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582fa00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85702400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d1000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e938c r4:857e9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8582f940 Call trace: r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 1d20: aae77000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:5823 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec769d84 r8:00000002 r7:60000013 r6:ec769d8c r5:85703c00 r4:85703c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85703c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec769e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582f440 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85703c00 r8:8583a12c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:84a2f400 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec711d84 r8:00000002 r7:60000013 r6:ec711d8c r5:84963c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582fc80 r5:857e9b8c r4:857e9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e9b8c r4:8583a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84963c00 r8:8583a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a180 r8:80287e08 r7:ec75de60 r6:8583a400 r5:84963c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8582fbc0 INFO: task kworker/0:505:5825 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ab6bc000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:5828 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:5828 tgid:5828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84818000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r5:00001000 r4:eb9b7000 r5:857ea78c r4:857ea400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:5829 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec779d84 r8:00000002 r7:60000113 r6:ec779d8c r5:85706000 r4:85706000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85706000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582ff80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb995000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ea38c r4:857ea000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ea38c r4:8583a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85706000 r8:8583a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a300 r8:80287e08 r7:ec76de60 r6:85808b80 r5:85706000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:5832 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec785d84 r8:00000002 r7:60000013 r6:ec785d8c r5:85706c00 r4:85706c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85706c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849280 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85706c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba03000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e878c r4:857e8400 r7:dddced80 r6:83018000 r5:857e878c r4:8583a700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xe04f1d28 to 0xe04f1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85704800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eaf8c r4:857eac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eaf8c r4:8583a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85704800 r8:8583a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a480 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a480 r8:80287e08 r7:ec785e60 r6:85808c80 r5:85704800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858490c0 INFO: task kworker/0:509:5833 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ac0de000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:ecf95000 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 INFO: task kworker/0:510:5835 blocked for more than 477 seconds. [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba59000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eab8c r4:857ea800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eab8c r4:8583a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fb000 r8:8583a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a680 r10:00000000 r9:8583a680 r8:80287e08 r7:ec785e60 r6:85808d00 r5:856fb000 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:5837 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec775d84 r8:00000002 r7:60000113 r6:ec775d8c r5:84818c00 r4:84818c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84818c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eb78c r4:857eb400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eb78c r4:8583a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84818c00 r8:8583a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a780 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a780 r8:80287e08 r7:ec791e60 r6:8583a880 r5:84818c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85849340 INFO: task kworker/0:511:5837 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ac68a000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:5840 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:5840 tgid:5840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec79dd84 r8:00000002 r7:60000013 r6:ec79dd8c r5:84819800 r4:84819800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84819800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:00001000 r4:eba8f000 r5:857ebf8c r4:857ebc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84819800 r8:8583a9ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04f1d28 to 0xe04f1d70) r5:80070013 r4:80239bb0 r4:e04f1dc0 r5:00001000 r4:ecf95000 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:5841 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a9d84 r8:00000002 r7:60000013 r6:ec7a9d8c r5:856fd400 r4:856fd400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fd400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849640 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:856fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa1000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eb38c r4:857eb000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eb38c r4:8583a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fd400 r8:8583a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a500 r8:80287e08 r7:ec79de60 r6:85808e00 r5:856fd400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85849040 Call trace: r5:80070013 r4:80239bb0 r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85708000 r4:8291a680 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:61c88647 r9:85708000 r8:8583aaac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:5846 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7b9d84 r8:00000002 r7:60000013 r6:ec7b9d8c r5:85709800 [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85709800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:857ecf8c r4:857ecc00 r7:dddced80 r6:83018000 r5:857ecf8c r4:8583a900 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ad13f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857e978c r4:857e9400 r10:00000000 r9:8583ab00 r8:80287e08 r7:ec7b9e60 r6:85808f80 r5:8570a400 1d60: 80230ad0 80239bb0 80070013 ffffffff [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r4:8570b000 r4:00000000 r5:00001000 r4:ebb61000 r7:ddde2d80 r6:83018200 r5:8484138c r4:85857000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b1fb0 to 0xec7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8584f9c0 INFO: task kworker/1:836:5850 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ad403000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5852 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5852 tgid:5852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c1d84 r8:00000002 r7:60000113 r6:ec7c1d8c r5:8570c800 r4:8570c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857ebb8c r4:857eb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ebb8c r4:85857100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570c800 r8:8585712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85857100 r4:00000001 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:00001000 r4:ecf95000 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85849d80 r5:857ecb8c r4:857ec800 r7:dddced80 r6:83018000 r5:857ecb8c r4:8583a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570d400 r8:8583a62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a600 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a600 r8:80287e08 r7:ec7b9e60 r6:85857300 r5:8570d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c5fb0 to 0xec7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85849d40 INFO: task kworker/0:517:5854 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e04f1dc0 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8481bc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582a600 r5:857ed38c r4:857ed000 r4:8583ac00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5857 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5857 tgid:5857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6cdd84 r8:00000002 r7:60000113 r6:ec6cdd8c r5:8570e000 r4:8570e000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570e000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858636c0 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: ade63000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 r5:00001000 r4:ecf95000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:5858 blocked for more than 477 seconds. r4:8570ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r5:00001000 r4:ec609000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed78c r4:857ed400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ed78c r4:8583aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570ec00 r8:8583aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583aa00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583aa00 r8:80287e08 r7:ec7a5e60 r6:85857480 r5:8570ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Call trace: r4:82ac21e4 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Not tainted 6.15.0-rc5-syzkaller #0 r4:00000000 r5:00001000 r4:ebdf9000 r5:857edb8c r4:857ed800 r10:00000000 r9:8583ac80 r8:80287e08 r7:ec7f5e60 r6:85857380 r5:85708c00 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585c1c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85880000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec641000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ee78c r4:857ee400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ee78c r4:8583a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85880000 r8:8583a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a800 r8:80287e08 r7:ec7f5e60 r6:85857400 r5:85880000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 INFO: task kworker/0:522:5865 blocked for more than 478 seconds. r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585c080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec637000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857edf8c r4:857edc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857edf8c r4:8583ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85880c00 r8:8583ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583ae00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583ae00 r8:80287e08 r7:ec825e60 r6:85857500 r5:85880c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) INFO: task kworker/0:522:5865 is blocked on a mutex likely owned by task kworker/0:129:3716. [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:84a2f400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857eef8c r4:857eec00 r10:61c88647 r9:85883c00 r8:85811e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85811e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85811e00 r8:80287e08 r7:ec825e60 r6:85857580 r5:85883c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec839fb0 to 0xec839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8585c040 INFO: task kworker/0:523:5869 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: aecac000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:5871 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:5871 tgid:5871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec83dd84 r8:00000002 r7:60000013 r6:ec83dd8c r5:85882400 r4:85882400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85882400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585c500 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85882400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6e5000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ef38c r4:857ef000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:857b2d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r5:80070013 r4:80239bb0 r4:00000000 r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:525 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857efb8c r4:857ef800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857efb8c r4:857b2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85881800 r8:857b2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857b2e00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b2e00 r8:80287e08 r7:ec83de60 r6:85857680 r5:85881800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8585c4c0 INFO: task kworker/0:525:5872 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: af418000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:5873 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r5:00001000 r4:ec71f000 r5:857eeb8c r4:857ee800 r10:61c88647 r9:85884800 r8:857b24ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:ec7cf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:5879 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:5879 tgid:5879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:85886000 r4:85886000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85886000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585c980 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85886000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857ef78c r4:857ef400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85886000 r8:856b612c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:00000000 r4:84a2f400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85886c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r5:857e3f8c r4:857e3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:5882 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:5882 tgid:5882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:85883000 r4:85883000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85883000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585cd40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85883000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ec78c r4:857ec400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ec78c r4:8583a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85883000 r8:8583a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583a380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583a380 r8:80287e08 r7:ec849e60 r6:85857900 r5:85883000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8585c840 INFO: task kworker/0:529:5882 is blocked on a mutex likely owned by task kworker/0:129:3716. r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: afec4000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:5884 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8570bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:857faf8c r4:857fac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85857a00 1fa0: 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b0059000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:5885 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:5885 tgid:5885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec861d84 r8:00000002 r7:60000013 r6:ec861d8c r5:85705400 r4:85705400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r9:83018005 r8:85705400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 r5:857f078c r4:857f0400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85862000 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:5887 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:5887 tgid:5887 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85888c00 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857f0b8c r4:857f0800 r7:dddced80 r6:83018000 r5:857f0b8c r4:85862280 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac21e4 r4:e04f1dc0 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:5889 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:5889 tgid:5889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec671d84 r8:00000002 r7:60000113 r6:ec671d8c r5:8588a400 r4:8588a400 r5:8588a400 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857f138c r4:857f1000 r7:dddced80 r6:83018000 r5:857f138c r4:85862100 r10:00000000 r9:85862100 r8:80287e08 r7:ec875e60 r6:85857c00 r5:8588a400 INFO: task kworker/0:532:5889 is blocked on a mutex likely owned by task kworker/0:129:3716. Exception stack(0xe04f1d28 to 0xe04f1d70) [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:5893 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:5893 tgid:5893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:8588b000 r4:8588b000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588b000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585c840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8588b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f038c r4:857f0000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f038c r4:85862380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588b000 r8:858623ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862380 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862380 r8:80287e08 r7:ec671e60 r6:85857d00 r5:8588b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8585cb00 INFO: task kworker/0:533:5893 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b0f37000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e04f1dc0 r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:534 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:85889800 r4:85889800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85889800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a400 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85889800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f238c r4:857f2000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f238c r4:85862300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85889800 r8:8586232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862300 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862300 r8:80287e08 r7:ec879e60 r6:85857e80 r5:85889800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8585c840 INFO: task kworker/0:534:5894 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b16f9000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85888000 [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857f1b8c r4:857f1800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f1b8c r4:85862480 r10:61c88647 r9:85888000 r8:858624ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a040 INFO: task kworker/0:535:5896 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b1c50000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:5899 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:5899 tgid:5899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:8588bc00 r4:8588bc00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588bc00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a1c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8588bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f0f8c r4:857f0c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f0f8c r4:85862080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588bc00 r8:858620ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862080 r8:80287e08 r7:ec87de60 r6:85857d80 r5:8588bc00 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec891fb0 to 0xec891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a2c0 INFO: task kworker/0:536:5899 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b207f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:5901 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec899d84 r8:00000002 r7:60000113 r6:ec899d8c r5:8588c800 r4:8588c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586aa40 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857f378c r4:857f3400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f378c r4:85862600 r10:61c88647 r9:8588c800 r8:8586262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:537:5901 is blocked on a mutex likely owned by task kworker/0:129:3716. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b23a8000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:5903 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:5903 tgid:5903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a1d84 r8:00000002 r7:60000013 r6:ec8a1d8c r5:8588d400 r4:8588d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a540 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8588d400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f178c r4:857f1400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f178c r4:85862200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588d400 r8:8586222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862200 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862200 r8:80287e08 r7:ec899e60 r6:85857f00 r5:8588d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a500 INFO: task kworker/0:538:5903 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b23a8000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:5904 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:8481e000 r4:8481e000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481e000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb937000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f2b8c r4:857f2800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f2b8c r4:85862500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481e000 r8:8586252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862500 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862500 r8:80287e08 r7:ec899e60 r6:85862680 r5:8481e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a600 INFO: task kworker/0:539:5904 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b26c5000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:5907 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:5907 tgid:5907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:8481d400 r4:8481d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481d400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7f000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f2f8c r4:857f2c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f2f8c r4:85862400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481d400 r8:8586242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862400 r8:80287e08 r7:ec899e60 r6:85862180 r5:8481d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a700 INFO: task kworker/0:540:5907 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b26c5000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:5910 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:5910 tgid:5910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a9d84 r8:00000002 r7:60000113 r6:ec8a9d8c r5:8481ec00 r4:8481ec00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481ec00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586a8c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f1f8c r4:857f1c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f1f8c r4:85862880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481ec00 r8:858628ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862880 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862880 r8:80287e08 r7:ec899e60 r6:85862900 r5:8481ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a640 INFO: task kworker/0:541:5910 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b29fc000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:5911 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:5911 tgid:5911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8add84 r8:00000002 r7:60000113 r6:ec8add8c r5:8481a400 r4:8481a400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481a400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586ab80 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd3000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f278c r4:857f2400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f278c r4:85862700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481a400 r8:8586272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862700 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862700 r8:80287e08 r7:ec899e60 r6:85862580 r5:8481a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586a600 INFO: task kworker/0:542:5911 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b29fc000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:543:5912 blocked for more than 478 seconds. r5:8481c800 r4:8291a680 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:5914 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:5914 tgid:5914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec869d84 r8:00000002 r7:60000113 r6:ec869d8c r5:8481b000 r4:8481b000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8481b000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586aec0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbfb000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f338c r4:857f3000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f338c r4:85862800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8481b000 r8:8586282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862800 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862800 r8:80287e08 r7:ec8b1e60 r6:85862a00 r5:8481b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586ac40 INFO: task kworker/0:544:5914 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b2ca0000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:5917 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000013 r6:ec8b5d8c r5:84928000 r4:84928000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84928000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85863fc0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eff8c r4:857efc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eff8c r4:85862c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84928000 r8:85862c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862c00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862c00 r8:80287e08 r7:ec869e60 r6:85862c80 r5:84928000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b5fb0 to 0xec8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:8586ac40 INFO: task kworker/0:545:5917 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b2f6a000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:5919 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:5919 tgid:5919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8bdd84 r8:00000002 r7:60000113 r6:ec8bdd8c r5:84928c00 r4:84928c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84928c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd080 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc15000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f878c r4:857f8400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f878c r4:85862d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84928c00 r8:85862dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862d80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862d80 r8:80287e08 r7:ec8b5e60 r6:85862e00 r5:84928c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd000 INFO: task kworker/0:546:5919 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b3378000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:5921 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000013 r6:ec8c1d8c r5:84929800 r4:84929800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84929800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd240 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc37000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f8f8c r4:857f8c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f8f8c r4:85862d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84929800 r8:85862d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862d00 r8:80287e08 r7:ec8bde60 r6:85862f80 r5:84929800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd340 INFO: task kworker/0:547:5921 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b3378000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:5923 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:5923 tgid:5923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c5d84 r8:00000002 r7:60000013 r6:ec8c5d8c r5:8492a400 r4:8492a400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492a400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd480 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc53000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f938c r4:857f9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f938c r4:85862b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:85862b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862b00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862b00 r8:80287e08 r7:ec8c1e60 r6:85862e80 r5:8492a400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd040 INFO: task kworker/0:548:5923 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b391b000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:5926 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:8492b000 r4:8492b000 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492b000 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd5c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f978c r4:857f9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f978c r4:85862b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492b000 r8:85862bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85862b80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85862b80 r8:80287e08 r7:ec8c5e60 r6:85862980 r5:8492b000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c9fb0 to 0xec8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd440 INFO: task kworker/0:549:5926 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b3f7f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:5927 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000113 r6:ec8cdd8c r5:8492bc00 r4:8492bc00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492bc00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd7c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc89000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f9b8c r4:857f9800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f9b8c r4:8583af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492bc00 r8:8583afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8583af80 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8583af80 r8:80287e08 r7:ec8c9e60 r6:8583ae80 r5:8492bc00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd540 INFO: task kworker/0:550:5927 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b3f7f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:5929 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:8492c800 r4:8492c800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492c800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bd840 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb9000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f9f8c r4:857f9c00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f9f8c r4:858c6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492c800 r8:858c602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6000 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6000 r8:80287e08 r7:ec8cde60 r6:858c6200 r5:8492c800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd780 INFO: task kworker/0:551:5929 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b4325000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:5931 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:8492d400 r4:8492d400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492d400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bda40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd11000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fa38c r4:857fa000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fa38c r4:858c6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492d400 r8:858c61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6180 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6180 r8:80287e08 r7:ec8d1e60 r6:858c6380 r5:8492d400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bd880 INFO: task kworker/0:552:5931 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b4325000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:5933 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:8492ec00 r4:8492ec00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492ec00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bdc40 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65b000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fa78c r4:857fa400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fa78c r4:858c6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492ec00 r8:858c62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6280 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6280 r8:80287e08 r7:ec8d5e60 r6:858c6480 r5:8492ec00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bda00 INFO: task kworker/0:553:5933 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b4934000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:5935 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:5935 tgid:5935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:84ac0c00 r4:84ac0c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac0c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bdd00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec669000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f8b8c r4:857f8800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f8b8c r4:858c6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac0c00 r8:858c60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6080 r8:80287e08 r7:ec8d9e60 r6:858c6300 r5:84ac0c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bdc00 INFO: task kworker/0:554:5935 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b4934000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:5936 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:5936 tgid:5936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:84ac1800 r4:84ac1800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac1800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c72c0 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ff000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fb78c r4:857fb400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fb78c r4:858c6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac1800 r8:858c612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6100 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6100 r8:80287e08 r7:ec8dde60 r6:858c6600 r5:84ac1800 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858bdf00 INFO: task kworker/0:555:5936 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b4b6e000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:5938 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:556 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:857fab8c r4:857fa800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:858c6500 r8:80287e08 r7:ec8e1e60 r6:858c6700 r5:84ac0000 Workqueue: events bpf_prog_free_deferred 1d20: b4d94000 e0071000 00000001 80239b98 7f11f000 00000001 r4:e04f1dc0 r4:00000000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:5940 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e9d84 r8:00000002 r7:60000113 r6:ec8e9d8c r5:84ac2400 r4:84ac2400 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac2400 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r5:857fbb8c r4:857fb800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fbb8c r4:858c6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac2400 r8:858c642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6400 r8:80287e08 r7:ec8e1e60 r6:858c6580 r5:84ac2400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85863280 INFO: task kworker/0:557:5940 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac21e4 r4:e04f1dc0 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 INFO: task kworker/1:841:5943 blocked for more than 479 seconds. task:kworker/1:841 state:D stack:0 pid:5943 tgid:5943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e5d84 r8:00000002 r7:60000113 r6:ec8e5d8c r5:84ac3c00 r4:84ac3c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac3c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85876000 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84ac3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec92d000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f3b8c r4:857f3800 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f3b8c r4:858cd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac3c00 r8:858cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858cd080 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858cd080 r8:80287e08 r7:ebbe9e60 r6:858c6880 r5:84ac3c00 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:85876c40 INFO: task kworker/1:841:5943 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:5945 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:84ac4800 r4:84ac4800 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac4800 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7580 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:857fbf8c r4:857fbc00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ac4800 r8:858c69ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac21e4 r4:00000000 [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858f938c r4:858f9000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858f938c r4:858c6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ac5400 r8:858c692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6900 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6900 r8:80287e08 r7:ec8ede60 r6:858c6b80 r5:84ac5400 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858c7540 INFO: task kworker/0:559:5947 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b5b1f000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:ec8fdd84 r8:00000002 r7:60000113 r6:ec8fdd8c r5:84ac6000 [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857f838c r4:857f8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ac6000 r8:858c6aac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858c7800 INFO: task kworker/0:560:5949 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000 [<81a53d7c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: b65c9000 e0071000 00000001 80239b98 7f11f000 00000001 1d40: 82ac15a0 7f11f000 e0071000 8280c928 82ac21c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85969b00 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84bc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf95000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8598af8c r4:8598ac00 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc8000 r8:84a2f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a2f400 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a2f400 r8:80287e08 r7:e04e9e60 r6:84b43880 r5:84bc8000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:849c4800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:5951 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:5951 tgid:5951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53988>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52a04>] (__schedule) from [<81a53988>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec909d84 r8:00000002 r7:60000013 r6:ec909d8c r5:84ac6c00 r4:84ac6c00 [<81a5395c>] (schedule) from [<81a53d70>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ac6c00 r4:8291a680 [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53d58>] (schedule_preempt_disabled) from [<81a56454>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a5690c>] (__mutex_lock_slowpath) from [<81a56960>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56924>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vm_reset_perms mm/vmalloc.c:3293 [inline]) [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204 mm/vmalloc.c:3372) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7880 r4:00000000 [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858f838c r4:858f8000 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858f838c r4:858c6b00 r10:61c88647 r9:84ac6c00 r8:858c6b2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:849c4800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec913000 r5:858f8b8c r4:858f8800 r10:61c88647 r9:84ac3000 r8:858c6eac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:82ac21e4 r4:00000000 r5:00001000 r4:ecf95000 r7:dddced80 r6:83018000 r5:8598af8c r4:84a2f400 Exception stack(0xe04f1fb0 to 0xe04f1ff8) INFO: task kworker/0:563:5955 blocked for more than 479 seconds. r4:8492e000 [<81a56154>] (__mutex_lock.constprop.0) from [<81a56920>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8492e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f978c r4:858f9400 [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858f978c r4:858c6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492e000 r8:858c6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858c6d00 [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858c6d00 r8:80287e08 r7:ec8f5e60 r6:858c6680 r5:8492e000 r4:00000001 [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 r4:858c7b80 INFO: task kworker/0:563:5955 is blocked on a mutex likely owned by task kworker/0:129:3716. task:kworker/0:129 state:R running task stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52a04>] (__schedule) from [<81a53dbc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84bc8000 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84bc8000 r4:00000000