Extracting prog: 11m23.718329845s Minimizing prog: 2h3m59.694506301s Simplifying prog options: 0s Extracting C: 8m40.985795422s Simplifying C: 58m39.951151938s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet-socket$nl_route-sendmmsg-socket-sendmsg$nl_route detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r1, 0x0, 0x0, 0x24000000) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r1, 0x0, 0x2) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet-socket$nl_route-sendmmsg-socket-sendmsg$nl_route detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r1, 0x0, 0x0, 0x24000000) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r1, 0x0, 0x2) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 7 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet-socket$nl_route-sendmmsg-socket detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r1, 0x0, 0x0, 0x24000000) socket(0x1, 0x803, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet-socket$nl_route-sendmmsg detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r1, 0x0, 0x0, 0x24000000) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet-socket$nl_route detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-getsockname$packet detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h22m44.349815486s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000 r4:83236000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588f440 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb575000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859eeb8c r4:859ee800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859eeb8c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b51c0 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 95629000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:1:52 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:52 tgid:52 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df935d84 r8:00000002 r7:60000113 r6:df935d8c r5:832e0000 r4:832e0000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e0000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df935e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f400 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df929000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447178c r4:84471400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447178c r4:832a0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e0000 r8:832a00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0080 r8:80287e08 r7:df879e60 r6:832a0100 r5:832e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf935fb0 to 0xdf935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832a10c0 INFO: task kworker/1:1:52 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 961b7000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:2:95 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:95 tgid:95 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83a85400 r4:83a85400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a85400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc200 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f177000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed993000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d26b8c r4:85d26800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d26b8c r4:832c5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a85400 r8:832c562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832c5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c5600 r8:80287e08 r7:df935e60 r6:832c5680 r5:83a85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832c4180 INFO: task kworker/1:2:95 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/0:3:3120 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:844d4800 r4:844d4800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d4800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca880 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576a78c r4:8576a400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576a78c r4:84cf5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d4800 r8:84cf562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf5600 r8:80287e08 r7:df845e60 r6:84cf5a80 r5:844d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8424ac00 INFO: task kworker/0:3:3120 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/0:4:3121 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000013 r6:df9d5d8c r5:844d3c00 r4:844d3c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d3c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f200 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854f7f8c r4:854f7c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854f7f8c r4:84cf5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d3c00 r8:84cf572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf5700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf5700 r8:80287e08 r7:df9cde60 r6:84cf5800 r5:844d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8424ac00 INFO: task kworker/0:4:3121 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:5:3124 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:844d6c00 r4:844d6c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d6c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dd1500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e0378c r4:84e03400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84e0378c r4:8475b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6c00 r8:8475b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475b680 r8:80287e08 r7:df935e60 r6:84cf5780 r5:844d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceb300 INFO: task kworker/1:5:3124 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:6:3126 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:844d6000 r4:844d6000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d6000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f580 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447078c r4:84470400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447078c r4:8475b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d6000 r8:8475b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475b800 r8:80287e08 r7:df935e60 r6:84cf5b00 r5:844d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceb740 INFO: task kworker/1:6:3126 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:7:3128 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa09d84 r8:00000002 r7:60000013 r6:dfa09d8c r5:844d0c00 r4:844d0c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d0c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512e500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb49000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85003b8c r4:85003800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85003b8c r4:8475b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d0c00 r8:8475b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475b880 r8:80287e08 r7:df935e60 r6:84cf5b80 r5:844d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceb840 INFO: task kworker/1:7:3128 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:8:3130 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:844d0000 r4:844d0000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d0000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ceb840 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85001f8c r4:85001c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85001f8c r4:8475bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d0000 r8:8475bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475bc00 r8:80287e08 r7:dfa09e60 r6:84cf5c00 r5:844d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceb700 INFO: task kworker/1:8:3130 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 INFO: task kworker/1:9:3132 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df99dd84 r8:00000002 r7:60000113 r6:df99dd8c r5:83aa8c00 r4:83aa8c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aa8c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8509e6c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85002f8c r4:85002c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85002f8c r4:8475b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aa8c00 r8:8475b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475b700 r8:80287e08 r7:dfa09e60 r6:8475b980 r5:83aa8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceb8c0 INFO: task kworker/1:9:3132 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:83ab3000 r4:83ab3000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ab3000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dfb00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07af000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84467f8c r4:84467c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84467f8c r4:8475be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ab3000 r8:8475be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475be00 r8:80287e08 r7:dfa09e60 r6:84cf5c80 r5:83ab3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ceba00 INFO: task kworker/1:10:3134 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3136 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:83aa9800 r4:83aa9800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aa9800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149000 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ceb8c r4:851ce800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ceb8c r4:8475bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aa9800 r8:8475bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475bc80 r8:80287e08 r7:dfa29e60 r6:8475bd00 r5:83aa9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cebac0 INFO: task kworker/1:11:3136 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:83aaa400 r4:83aaa400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aaa400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85274300 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae41000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851cef8c r4:851cec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851cef8c r4:8475ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aaa400 r8:8475baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475ba80 r8:80287e08 r7:dfa29e60 r6:8475ba00 r5:83aaa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cebc80 INFO: task kworker/1:12:3140 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3141 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83aabc00 r4:83aabc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aabc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852744c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851cf78c r4:851cf400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851cf78c r4:8475bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aabc00 r8:8475bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475bb00 r8:80287e08 r7:dfa29e60 r6:8475bb80 r5:83aabc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8424aec0 INFO: task kworker/1:13:3141 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3143 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000013 r6:dfa4dd8c r5:832e6000 r4:832e6000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e6000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dfd40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533838c r4:85338000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533838c r4:8475bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e6000 r8:8475bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475bd80 r8:80287e08 r7:dfa29e60 r6:8475bf00 r5:832e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8424aec0 INFO: task kworker/1:14:3143 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83242400 r4:83242400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415980 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544eb8c r4:8544e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544eb8c r4:8475bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:8475bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475bf80 r8:80287e08 r7:dfa29e60 r6:8475be80 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c210c0 INFO: task kworker/1:15:3144 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3147 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83244800 r4:83244800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dfa40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0723000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84473f8c r4:84473c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84473f8c r4:8475b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:8475b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8475b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475b400 r8:80287e08 r7:dfa61e60 r6:832c5700 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21180 INFO: task kworker/1:16:3147 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3148 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83861800 r4:83861800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83861800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550af80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83861800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ab000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85345b8c r4:85345800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85345b8c r4:832c5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83861800 r8:832c55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832c5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c5580 r8:80287e08 r7:dfa61e60 r6:830b8780 r5:83861800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21180 INFO: task kworker/1:17:3148 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83860c00 r4:83860c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83860c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540d8c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83860c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb083000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534578c r4:85345400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534578c r4:830b8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83860c00 r8:830b872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:80287e08 r7:dfa75e60 r6:84cf5d00 r5:83860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21540 INFO: task kworker/1:18:3151 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3153 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83cdc800 r4:83cdc800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cdc800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877d80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b238c r4:858b2000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b238c r4:8389a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cdc800 r8:8389a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8389a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8389a680 r8:80287e08 r7:dfa75e60 r6:84cf5d80 r5:83cdc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21800 INFO: task kworker/1:19:3153 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83cdd400 r4:83cdd400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cdd400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cdd400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e896d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534738c r4:85347000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8534738c r4:8389a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cdd400 r8:8389a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8389a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8389a480 r8:80287e08 r7:dfa8de60 r6:84cf5e00 r5:83cdd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21800 INFO: task kworker/1:20:3155 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:833aec00 r4:833aec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833aec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531b00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:833aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563df8c r4:8563dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8563df8c r4:8389a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833aec00 r8:8389a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8389a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8389a600 r8:80287e08 r7:dfa8de60 r6:84cf5e80 r5:833aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21700 INFO: task kworker/1:21:3156 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9a377000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83a86000 r4:83a86000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a86000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce9c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb691000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85603f8c r4:85603c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85603f8c r4:832a0580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a86000 r8:832a05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0580 r8:80287e08 r7:dfa8de60 r6:84cf5f00 r5:83a86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21c00 INFO: task kworker/1:22:3160 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9dcbc000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3161 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83a83000 r4:83a83000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a83000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b17c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a83000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576878c r4:85768400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576878c r4:84cf5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a83000 r8:84cf5fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cf5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cf5f80 r8:80287e08 r7:df9cde60 r6:84cf5a00 r5:83a83000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84774a80 INFO: task kworker/0:5:3161 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9e243000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83a84800 r4:83a84800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a84800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b6480 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85620b8c r4:85620800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85620b8c r4:830cc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a84800 r8:830cc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc100 r8:80287e08 r7:dfa8de60 r6:8475b380 r5:83a84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21dc0 INFO: task kworker/1:23:3162 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9e9d8000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:83a80000 r4:83a80000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a80000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856caa00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575478c r4:85754400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575478c r4:830cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a80000 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:80287e08 r7:dfa8de60 r6:83364f80 r5:83a80000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21cc0 INFO: task kworker/1:24:3165 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9ebd9000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3166 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8449bc00 r4:8449bc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449bc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d9b80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8449bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575eb8c r4:8575e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575eb8c r4:830cc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449bc00 r8:830cc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc300 r8:80287e08 r7:dfa8de60 r6:83364e80 r5:8449bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21e40 INFO: task kworker/1:25:3166 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9f36e000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:84499800 r4:84499800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84499800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e3180 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84499800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc2f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859efb8c r4:859ef800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859efb8c r4:84259d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84499800 r8:84259d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84259d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84259d00 r8:80287e08 r7:df9cde60 r6:84259d80 r5:84499800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84774a00 INFO: task kworker/0:6:3170 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: 9fde0000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3171 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:84498c00 r4:84498c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84498c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877b80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb95000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574e38c r4:8574e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574e38c r4:830cc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84498c00 r8:830cc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc400 r8:80287e08 r7:dfa8de60 r6:8439ec80 r5:84498c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c21f00 INFO: task kworker/1:26:3171 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a0415000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3174 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:8449a400 r4:8449a400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449a400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ed140 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8449a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574fb8c r4:8574f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574fb8c r4:830cc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449a400 r8:830cc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc280 r8:80287e08 r7:dfa8de60 r6:84632f00 r5:8449a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489180 INFO: task kworker/1:27:3174 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a0415000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:8449c800 r4:8449c800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449c800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84489640 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8449c800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2df8c r4:85a2dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2df8c r4:830cc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449c800 r8:830cc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc380 r8:80287e08 r7:dfaf9e60 r6:8448e000 r5:8449c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844890c0 INFO: task kworker/1:28:3175 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a0b63000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3178 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb0dd84 r8:00000002 r7:60000013 r6:dfb0dd8c r5:8449ec00 r4:8449ec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449ec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85920900 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8449ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447af8c r4:8447ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447af8c r4:84248200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449ec00 r8:8424822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84248200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84248200 r8:80287e08 r7:dfafde60 r6:8448e080 r5:8449ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489300 INFO: task kworker/1:29:3178 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1329000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:8449d400 r4:8449d400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449d400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859148c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8449d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585238c r4:85852000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8585238c r4:8471be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449d400 r8:8471be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8471be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471be00 r8:80287e08 r7:dfafde60 r6:8448e100 r5:8449d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489300 INFO: task kworker/1:30:3179 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1540000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:84498000 r4:84498000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84498000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85918040 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84498000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df849000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2e38c r4:85a2e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2e38c r4:847b9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84498000 r8:847b90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847b9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9080 r8:80287e08 r7:dfafde60 r6:8448e180 r5:84498000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489040 INFO: task kworker/1:31:3181 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1540000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:8449b000 r4:8449b000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8449b000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2a80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8449b000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1db8c r4:85a1d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a1db8c r4:8448e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8449b000 r8:8448e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e200 r8:80287e08 r7:dfaa1e60 r6:8448e280 r5:8449b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448d380 INFO: task kworker/0:7:3185 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1894000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3187 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83ce2400 r4:83ce2400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ce2400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bb940 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd81000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1df8c r4:85a1dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a1df8c r4:8448e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ce2400 r8:8448e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e300 r8:80287e08 r7:dfaade60 r6:8448e380 r5:83ce2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448d740 INFO: task kworker/0:8:3187 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1dbd000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3189 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83862400 r4:83862400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83862400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515d40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83862400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc75000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6d78c r4:85a6d400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6d78c r4:8448e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83862400 r8:8448e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e400 r8:80287e08 r7:dfb21e60 r6:847b9100 r5:83862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448d580 INFO: task kworker/0:9:3189 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a1dbd000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3192 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:84d20000 r4:84d20000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d20000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dd00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d20000 r7:00000000 r6:83018200 r5:00001000 r4:7f135000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed847000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2538c r4:85d25000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d2538c r4:847b9280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d20000 r8:847b92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847b9280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9280 r8:80287e08 r7:dfb41e60 r6:847b9300 r5:84d20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489c00 INFO: task kworker/1:33:3192 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a21f1000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3194 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:84d21800 r4:84d21800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d21800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515e80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d21800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc83000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6db8c r4:85a6d800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6db8c r4:8448e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d21800 r8:8448e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e480 r8:80287e08 r7:dfb35e60 r6:847b9380 r5:84d21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448d800 INFO: task kworker/0:10:3194 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a25be000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3196 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83ce6c00 r4:83ce6c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ce6c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c2e80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83ce6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df955000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6e38c r4:85a6e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6e38c r4:8448e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ce6c00 r8:8448e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e500 r8:80287e08 r7:dfb51e60 r6:8448e580 r5:83ce6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448d980 INFO: task kworker/0:11:3196 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a25be000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3198 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83ce0000 r4:83ce0000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ce0000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b31c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83ce0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc8d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6df8c r4:85a6dc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6df8c r4:8448e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ce0000 r8:8448e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e600 r8:80287e08 r7:dfb2de60 r6:8448e680 r5:83ce0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448dac0 INFO: task kworker/0:12:3198 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a2d06000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3200 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84163000 r4:84163000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84163000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf280 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84163000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6f38c r4:85a6f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6f38c r4:8448e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84163000 r8:8448e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e700 r8:80287e08 r7:dfb2de60 r6:8448e780 r5:84163000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448dcc0 INFO: task kworker/0:13:3200 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a2d06000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3201 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:84165400 r4:84165400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84165400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85515f80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84165400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb23000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6e78c r4:85a6e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6e78c r4:8448e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84165400 r8:8448e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e800 r8:80287e08 r7:dfb65e60 r6:8448e880 r5:84165400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8448dfc0 INFO: task kworker/0:14:3201 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a3499000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3203 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:84162400 r4:84162400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84162400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf040 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84162400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6eb8c r4:85a6e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6eb8c r4:8448e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84162400 r8:8448e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448e900 r8:80287e08 r7:dfb65e60 r6:8448e980 r5:84162400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847360c0 INFO: task kworker/0:15:3203 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a38c3000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3206 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:84c38c00 r4:84c38c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c38c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf1c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6ef8c r4:85a6ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6ef8c r4:8448ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c38c00 r8:8448ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ea00 r8:80287e08 r7:dfb65e60 r6:8448ea80 r5:84c38c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736200 INFO: task kworker/0:16:3206 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a38c3000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3209 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:84d24800 r4:84d24800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d24800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf5c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6ff8c r4:85a6fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6ff8c r4:8448eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d24800 r8:8448eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448eb00 r8:80287e08 r7:dfb65e60 r6:847b9400 r5:84d24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736340 INFO: task kworker/0:17:3209 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a38c3000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3210 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:84d22400 r4:84d22400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d22400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf380 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdb7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6f78c r4:85a6f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6f78c r4:8448eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d22400 r8:8448ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448eb80 r8:80287e08 r7:dfba5e60 r6:847b9480 r5:84d22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736480 INFO: task kworker/0:18:3210 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a41b5000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3212 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84d23c00 r4:84d23c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d23c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf4c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d23c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a6fb8c r4:85a6f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a6fb8c r4:8448ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d23c00 r8:8448ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ec00 r8:80287e08 r7:dfba5e60 r6:847b9500 r5:84d23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736580 INFO: task kworker/0:19:3212 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a41b5000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3213 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84d25400 r4:84d25400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d25400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf880 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d25400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a70b8c r4:85a70800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a70b8c r4:8448ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d25400 r8:8448ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ec80 r8:80287e08 r7:dfba5e60 r6:847b9580 r5:84d25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736580 INFO: task kworker/0:20:3213 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a41b5000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3215 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:84d23000 r4:84d23000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d23000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf6c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d23000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec767000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7038c r4:85a70000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7038c r4:8448ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d23000 r8:8448ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ed00 r8:80287e08 r7:dfbc1e60 r6:847b9600 r5:84d23000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736740 INFO: task kworker/0:21:3215 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a475b000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3217 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84d26000 r4:84d26000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d26000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d26000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec791000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7078c r4:85a70400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7078c r4:8448ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d26000 r8:8448edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ed80 r8:80287e08 r7:dfbc1e60 r6:847b9680 r5:84d26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736880 INFO: task kworker/0:22:3217 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a475b000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3219 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe5d84 r8:00000002 r7:60000013 r6:dfbe5d8c r5:84d26c00 r4:84d26c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d26c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfc00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7178c r4:85a71400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7178c r4:8448ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d26c00 r8:8448ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ee00 r8:80287e08 r7:dfbc1e60 r6:847b9700 r5:84d26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736880 INFO: task kworker/0:23:3219 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a475b000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3221 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000013 r6:dfbf5d8c r5:84d20c00 r4:84d20c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d20c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfa00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec803000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a70f8c r4:85a70c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a70f8c r4:8448ee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d20c00 r8:8448eeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ee80 r8:80287e08 r7:dfbe5e60 r6:847b9780 r5:84d20c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736ac0 INFO: task kworker/0:24:3221 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a4b65000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3225 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:84d28000 r4:84d28000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d28000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfd00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d28000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec955000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71b8c r4:85a71800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71b8c r4:8448ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d28000 r8:8448ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ef00 r8:80287e08 r7:dfbe5e60 r6:847b9800 r5:84d28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84736ec0 INFO: task kworker/0:25:3225 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a4b65000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3226 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84d28c00 r4:84d28c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d28c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502de40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f137000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed857000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2578c r4:85d25400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d2578c r4:847b9880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d28c00 r8:847b98ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847b9880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9880 r8:80287e08 r7:dfb41e60 r6:847b9900 r5:84d28c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475d9c0 INFO: task kworker/1:34:3226 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a4b65000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3229 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000013 r6:dfc19d8c r5:84d29800 r4:84d29800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d29800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5780 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d29800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7478c r4:85a74400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7478c r4:8448ef80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d29800 r8:8448efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8448ef80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8448ef80 r8:80287e08 r7:dfb89e60 r6:847b9980 r5:84d29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735100 INFO: task kworker/0:26:3229 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a5117000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3230 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84d2a400 r4:84d2a400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d2a400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfdc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a71f8c r4:85a71c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a71f8c r4:843b2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d2a400 r8:843b202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2000 r8:80287e08 r7:dfc19e60 r6:847b9a00 r5:84d2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735340 INFO: task kworker/0:27:3230 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a5117000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3232 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84c39800 r4:84c39800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c39800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfec0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c39800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7238c r4:85a72000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7238c r4:843b2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c39800 r8:843b20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2080 r8:80287e08 r7:dfc19e60 r6:843b2100 r5:84c39800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847351c0 INFO: task kworker/0:28:3232 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a56bc000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3235 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc39d84 r8:00000002 r7:60000113 r6:dfc39d8c r5:84d2bc00 r4:84d2bc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d2bc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc040 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed879000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d25f8c r4:85d25c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d25f8c r4:847b9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d2bc00 r8:847b9aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847b9a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9a80 r8:80287e08 r7:dfb41e60 r6:847b9b00 r5:84d2bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc39fb0 to 0xdfc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475dd80 INFO: task kworker/1:35:3235 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a56bc000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3236 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84c3a400 r4:84c3a400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3a400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c2e40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7278c r4:85a72400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7278c r4:843b2180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3a400 r8:843b21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2180 r8:80287e08 r7:dfc19e60 r6:843b2200 r5:84c3a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735480 INFO: task kworker/0:29:3236 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a5deb000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3238 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:84c3c800 r4:84c3c800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3c800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5140 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a72f8c r4:85a72c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a72f8c r4:843b2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3c800 r8:843b22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2280 r8:80287e08 r7:dfc19e60 r6:843b2300 r5:84c3c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735600 INFO: task kworker/0:30:3238 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a5deb000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3239 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc45d84 r8:00000002 r7:60000013 r6:dfc45d8c r5:84c3d400 r4:84c3d400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3d400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ea680 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a76f8c r4:85a76c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a76f8c r4:843b2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3d400 r8:843b242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2400 r8:80287e08 r7:dfc19e60 r6:843b2480 r5:84c3d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735600 INFO: task kworker/0:31:3239 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a5deb000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3240 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:84d2c800 r4:84d2c800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d2c800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc140 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f16b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed881000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d2638c r4:85d26000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d2638c r4:847b9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d2c800 r8:847b9bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847b9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b9b80 r8:80287e08 r7:dfb41e60 r6:847b9c00 r5:84d2c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475df40 INFO: task kworker/1:36:3240 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a619c000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3243 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000013 r6:dfc51d8c r5:84d2d400 r4:84d2d400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d2d400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5680 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7438c r4:85a74000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7438c r4:843b2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d2d400 r8:843b252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2500 r8:80287e08 r7:dfc19e60 r6:847b9c80 r5:84d2d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847359c0 INFO: task kworker/0:32:3243 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a65fa000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc71d84 r8:00000002 r7:60000013 r6:dfc71d8c r5:84d2e000 r4:84d2e000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d2e000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5f00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7638c r4:85a76000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7638c r4:843b2580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d2e000 r8:843b25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2580 r8:80287e08 r7:dfc19e60 r6:847b9d00 r5:84d2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735bc0 INFO: task kworker/0:33:3247 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a65fa000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3248 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc75d84 r8:00000002 r7:60000013 r6:dfc75d8c r5:84c3bc00 r4:84c3bc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3bc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cff00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdc5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a76b8c r4:85a76800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a76b8c r4:843b2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3bc00 r8:843b262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2600 r8:80287e08 r7:dfc71e60 r6:843b2680 r5:84c3bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84735bc0 INFO: task kworker/0:34:3248 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a6a1c000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3252 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84c3b000 r4:84c3b000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3b000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8448d840 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd65000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7678c r4:85a76400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7678c r4:843b2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3b000 r8:843b272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2700 r8:80287e08 r7:dfc71e60 r6:843b2780 r5:84c3b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8424a680 INFO: task kworker/0:35:3252 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a6a1c000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3254 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:84c38000 r4:84c38000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c38000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5a80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c38000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd4b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7538c r4:85a75000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7538c r4:843b2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c38000 r8:843b282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2800 r8:80287e08 r7:dfc71e60 r6:843b2880 r5:84c38000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16100 INFO: task kworker/0:36:3254 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a6de8000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3256 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa21d84 r8:00000002 r7:60000013 r6:dfa21d8c r5:84c3e000 r4:84c3e000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c3e000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5e00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84c3e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb61000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a75f8c r4:85a75c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a75f8c r4:843b2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c3e000 r8:843b292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2900 r8:80287e08 r7:dfc71e60 r6:843b2980 r5:84c3e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16200 INFO: task kworker/0:37:3256 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a6de8000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3258 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000013 r6:dfa3dd8c r5:84ed0000 r4:84ed0000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed0000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5c40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a75b8c r4:85a75800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a75b8c r4:843b2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed0000 r8:843b2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2a00 r8:80287e08 r7:dfa21e60 r6:843b2a80 r5:84ed0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16540 INFO: task kworker/0:38:3258 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a71df000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3260 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000013 r6:df9e9d8c r5:84ed1800 r4:84ed1800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed1800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5b00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ad000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7578c r4:85a75400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7578c r4:843b2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed1800 r8:843b2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2b00 r8:80287e08 r7:dfa3de60 r6:843b2b80 r5:84ed1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d161c0 INFO: task kworker/0:39:3260 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a71df000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3261 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc85d84 r8:00000002 r7:60000013 r6:dfc85d8c r5:84ed3000 r4:84ed3000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed3000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5880 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a74b8c r4:85a74800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a74b8c r4:843b2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed3000 r8:843b2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2c00 r8:80287e08 r7:df9e9e60 r6:843b2c80 r5:84ed3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16700 INFO: task kworker/0:40:3261 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a76f5000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3264 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:84ed0c00 r4:84ed0c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed0c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5580 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a73f8c r4:85a73c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a73f8c r4:843b2d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed0c00 r8:843b2d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2d00 r8:80287e08 r7:dfc85e60 r6:843b2d80 r5:84ed0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d169c0 INFO: task kworker/0:41:3264 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a76f5000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3266 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000013 r6:dfc59d8c r5:84ed3c00 r4:84ed3c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed3c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5980 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd35000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a74f8c r4:85a74c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a74f8c r4:843b2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed3c00 r8:843b2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2e00 r8:80287e08 r7:dfc81e60 r6:843b2e80 r5:84ed3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d169c0 INFO: task kworker/0:42:3266 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a7f19000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3268 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:84ed4800 r4:84ed4800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed4800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5200 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a7338c r4:85a73000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7338c r4:843b2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed4800 r8:843b2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843b2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b2f00 r8:80287e08 r7:dfc81e60 r6:843b2f80 r5:84ed4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16f00 INFO: task kworker/0:43:3268 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a7f19000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddad00 r8:80287e08 r7:e0581e60 r6:84ec1b80 r5:84fb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc8dd84 r8:00000002 r7:60000013 r6:dfc8dd8c r5:84ed5400 r4:84ed5400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed5400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5400 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84ed5400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a73b8c r4:85a73800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a73b8c r4:847be000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed5400 r8:847be02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847be000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847be000 r8:80287e08 r7:dfc81e60 r6:847be080 r5:84ed5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d16d40 INFO: task kworker/0:44:3270 is blocked on a mutex likely owned by task kworker/0:172:3776. task:kworker/0:172 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb3c00 r8:80200be4 r7:e0595d5c r6:ffffffff r5:84fb3c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0595d28 to 0xe0595d70) 5d20: a7f19000 e00a5000 00000001 80239b98 7f379000 00000001 5d40: 82ac15a0 7f379000 e00a5000 8280c928 82ac21c4 e0595da4 e0595da8 e0595d78 5d60: 80230ad0 80239bb0 800d0013 ffffffff r5:800d0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0595dc0 r5:e0595e08 r4:e0595dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0c78c r4:84f0c400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0c78c r4:84ddad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb3c00 r8:84ddad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kth <> r5:00001000 r4:ebc77000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584eb8c r4:8584e800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8584eb8c r4:8591c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859abc00 r8:8591c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591c580 r8:80287e08 r7:ec921e60 r6:8591c600 r5:859abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec929fb0 to 0xec929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85916ac0 INFO: task kworker/0:945:5956 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 98e99000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:00000000 r5:84f0cf8c r4:84f0cc00 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599db8c r4:8599d800 r10:61c88647 r9:859ac800 r8:8591c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xec92dfb0 to 0xec92dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: 98e99000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:82ac21e4 r4:e0581dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:5960 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:859a8c00 r4:859a8c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a8c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85903440 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd49000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584f78c r4:8584f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8584f78c r4:8591b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a8c00 r8:8591b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591b480 r8:80287e08 r7:ec925e60 r6:8591c780 r5:859a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859030c0 INFO: task kworker/1:461:5960 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 994f9000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:5963 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:5963 tgid:5963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec919d84 r8:00000002 r7:60000013 r6:ec919d8c r5:859ad400 r4:859ad400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599ef8c r4:8599ec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599ef8c r4:8591c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8591c800 r8:80287e08 r7:ec92de60 r6:8591c880 r5:859ad400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85916f00 INFO: task kworker/0:947:5963 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 994f9000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:462:5964 blocked for more than 477 seconds. r5:859ae000 r4:8291a680 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8585038c r4:85850000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8591b500 Exception stack(0xec939fb0 to 0xec939ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 1d20: 99a07000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:e0581dc0 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec941d84 r8:00000002 r7:60000113 r6:ec941d8c r5:859a9800 r4:859a9800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a9800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85903540 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd5f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584fb8c r4:8584f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8584fb8c r4:8591b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a9800 r8:8591b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591b580 r8:80287e08 r7:ec939e60 r6:8591c980 r5:859a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec941fb0 to 0xec941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85903400 INFO: task kworker/1:463:5966 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 99a07000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5968 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8584ff8c r4:8584fc00 r10:61c88647 r9:84db4800 r8:8591b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859034c0 INFO: task kworker/1:464:5968 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9a062000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:5970 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:5970 tgid:5970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:84db3c00 r4:84db3c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db3c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85903880 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84db3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585078c r4:85850400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8585078c r4:8591b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84db3c00 r8:8591b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591b680 r8:80287e08 r7:ec939e60 r6:8591ca80 r5:84db3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec951fb0 to 0xec951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 9a062000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:82ac21e4 r4:e0581dc0 r4:00000000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84f0cf8c r4:84f0cc00 r4:84ddab80 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:5972 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec959d84 r8:00000002 r7:60000013 r6:ec959d8c r5:850a8c00 r4:850a8c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850a8c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f86c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599e38c r4:8599e000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599e38c r4:8591cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a8c00 r8:8591cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591cb00 r8:80287e08 r7:ec919e60 r6:8591cb80 r5:850a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f81c0 INFO: task kworker/0:948:5972 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9a529000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5973 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85850b8c r4:85850800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:82ac21e4 r4:e0581dc0 r5:00001000 r4:df927000 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:5979 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:850a8000 r4:850a8000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850a8000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85903b00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85850f8c r4:85850c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85850f8c r4:8591b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850a8000 r8:8591b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591b780 r8:80287e08 r7:ec95de60 r6:8591cc80 r5:850a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85903b80 INFO: task kworker/1:467:5979 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9a976000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:5980 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:5980 tgid:5980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:857ee000 r4:857ee000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ee000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8585138c r4:85851000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8585138c r4:8591b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ee000 r8:8591b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591b800 r8:80287e08 r7:ec86de60 r6:8591b880 r5:857ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85903b80 INFO: task kworker/1:468:5980 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9ae41000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc5-syzkaller #0 r5:857ec800 r4:8291a680 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8585178c r4:85851400 r7:ddde2d80 r6:83018200 r5:8585178c r4:8591b900 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:e0581dc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:5983 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:5983 tgid:5983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec83dd84 r8:00000002 r7:60000013 r6:ec83dd8c r5:857ebc00 r4:857ebc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ebc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859163c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:857ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85851b8c r4:85851800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85851b8c r4:8591ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ebc00 r8:8591ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591ba00 r8:80287e08 r7:ec89de60 r6:8591ba80 r5:857ebc00 Exception stack(0xec83dfb0 to 0xec83dff8) task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0581dc0 r5:00001000 r4:df927000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:471:5985 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:857eec00 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eb423000 r5:85852b8c r4:85852800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85852b8c r4:8591bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8591bb00 r10:00000000 r9:8591bb00 r8:80287e08 r7:ec83de60 r6:8591bb80 r5:857eec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85916c80 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9b860000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:5987 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:5987 tgid:5987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec965d84 r8:00000002 r7:60000113 r6:ec965d8c r5:85713c00 r4:85713c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85903f00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85713c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb75000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85851f8c r4:85851c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85851f8c r4:8591bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85713c00 r8:8591bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8591bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591bc00 r8:80287e08 r7:ec961e60 r6:8591bc80 r5:85713c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec965fb0 to 0xec965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85903000 INFO: task kworker/1:472:5987 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9b860000 e00c3000 00000001 80239b98 7f37f000 00000001 r5:80070013 r4:80239bb0 r4:e0581dc0 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84f0cf8c r4:84f0cc00 r4:84ddab80 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585278c r4:85852400 r10:61c88647 r9:85990000 r8:8591bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85903000 INFO: task kworker/1:473:5989 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9bd81000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:5991 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec971d84 r8:00000002 r7:60000013 r6:ec971d8c r5:85990c00 r4:85990c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85990c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f8c40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85990c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8599e78c r4:8599e400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599e78c r4:8591cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85990c00 r8:8591cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: 9bd81000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:e0581dc0 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:950:5993 blocked for more than 477 seconds. r4:85991800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec975e08 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599eb8c r4:8599e800 r7:dddced80 r6:83018000 r5:8599eb8c r4:8591cd80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:858f8f00 INFO: task kworker/0:950:5993 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9bd81000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:5995 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:5995 tgid:5995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec979d84 r8:00000002 r7:60000013 r6:ec979d8c r5:85992400 r4:85992400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85992400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f8a00 r5:8599f38c r4:8599f000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec979fb0 to 0xec979ff8) r4:858f8f00 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r5:84f0cf8c r4:84f0cc00 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599f78c r4:8599f400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599f78c r4:8591ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85993000 r8:8591ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591ce80 r8:80287e08 r7:ec979e60 r6:8591bf80 r5:85993000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f8f80 INFO: task kworker/0:952:5997 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9c553000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:5999 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:5999 tgid:5999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec981d84 r8:00000002 r7:60000113 r6:ec981d8c r5:85993c00 r4:85993c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85993c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec981e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921f00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85993c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599fb8c r4:8599f800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599fb8c r4:8591cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85993c00 r8:8591cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591cf00 r8:80287e08 r7:ec97de60 r6:858ec000 r5:85993c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: 9c553000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:82ac21e4 r4:e0581dc0 r4:00000000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:954:6001 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:954 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:85994800 r4:85994800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85994800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8240 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85994800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec695000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e838c r4:859e8000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e838c r4:8591cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85994800 r8:8591cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8591cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8591cf80 r8:80287e08 r7:ec981e60 r6:858ec080 r5:85994800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f8f80 INFO: task kworker/0:954:6001 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9c7b2000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84f0cf8c r4:84f0cc00 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:6003 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:85996000 r4:85996000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85996000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8040 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85996000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8599ff8c r4:8599fc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8599ff8c r4:858aa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996000 r8:858aa02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa000 r10:00000000 r9:858aa000 r8:80287e08 r7:ec985e60 r6:858ec100 r5:85996000 Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8080 INFO: task kworker/0:955:6003 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9c7b2000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:6005 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:956 state:D stack:0 pid:6005 tgid:6005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:85995400 r5:85995400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8180 r5:858df38c r4:858df000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858df38c r4:858aa080 r4:858aa080 Exception stack(0xec995fb0 to 0xec995ff8) r4:858e8140 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 1d20: 9d24f000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:e0581dc0 r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84cfd140 Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8800 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec70b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e938c r4:859e9000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e938c r4:858aa100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f78c00 r8:858aa12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa100 r8:80287e08 r7:ec985e60 r6:858ec200 r5:84f78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8280 INFO: task kworker/0:957:6007 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9d24f000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:6008 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:84f79800 r5:84f79800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8380 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f79800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e878c r4:859e8400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e878c r4:858aa180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f79800 r8:858aa1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa180 r8:80287e08 r7:ec99de60 r6:858ec280 r5:84f79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8440 INFO: task kworker/0:958:6008 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9d24f000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:6011 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:6011 tgid:6011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9add84 r8:00000002 r7:60000113 r6:ec9add8c r5:84f78000 r4:84f78000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f78000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8580 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f78000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6e5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e8b8c r4:859e8800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e8b8c r4:858aa200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f78000 r8:858aa22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa200 r8:80287e08 r7:ec99de60 r6:858ec300 r5:84f78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e83c0 INFO: task kworker/0:959:6011 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9d6ca000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:6012 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:84f7a400 r4:84f7a400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f7a400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8700 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f7a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e8f8c r4:859e8c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e8f8c r4:858aa280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7a400 r8:858aa2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa280 r8:80287e08 r7:ec99de60 r6:858ec380 r5:84f7a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e84c0 INFO: task kworker/0:960:6012 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9d86c000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:6015 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:6015 tgid:6015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9bdd84 r8:00000002 r7:60000113 r6:ec9bdd8c r5:84f7d400 r4:84f7d400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f7d400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8dc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f7d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ea78c r4:859ea400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ea78c r4:858aa300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7d400 r8:858aa32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa300 r8:80287e08 r7:ec99de60 r6:858ec400 r5:84f7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8640 INFO: task kworker/0:961:6015 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9de74000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:6016 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9c1d84 r8:00000002 r7:60000113 r6:ec9c1d8c r5:84f7bc00 r4:84f7bc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f7bc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e88c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec769000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e978c r4:859e9400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e978c r4:858aa380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7bc00 r8:858aa3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa380 r8:80287e08 r7:ec9bde60 r6:858ec480 r5:84f7bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8640 INFO: task kworker/0:962:6016 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9e491000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:963:6018 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:963 state:D stack:0 pid:6018 tgid:6018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9c9d84 r8:00000002 r7:60000113 r6:ec9c9d8c r5:84f7c800 r4:84f7c800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f7c800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8a00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e9b8c r4:859e9800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e9b8c r4:858aa400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7c800 r8:858aa42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa400 r8:80287e08 r7:ec9bde60 r6:858ec500 r5:84f7c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8900 INFO: task kworker/0:963:6018 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9e491000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:964:6020 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:964 state:D stack:0 pid:6020 tgid:6020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d1d84 r8:00000002 r7:60000013 r6:ec9d1d8c r5:84f7ec00 r4:84f7ec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f7ec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858e8b40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84f7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec787000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859e9f8c r4:859e9c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859e9f8c r4:858aa480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7ec00 r8:858aa4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa480 r8:80287e08 r7:ec9bde60 r6:858ec580 r5:84f7ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8a40 INFO: task kworker/0:964:6020 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9e491000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:84cfd140 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:00001000 r4:ec799000 r5:859ea38c r4:859ea000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858e8b80 INFO: task kworker/0:965:6022 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9e491000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Not tainted 6.15.0-rc5-syzkaller #0 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859eaf8c r4:859eac00 r4:858aa600 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9ea92000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:967:6026 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:967 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:850ac800 r4:850ac800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ac800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f8100 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859eab8c r4:859ea800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84cfd140 task:kworker/0:968 state:D stack:0 pid:6029 tgid:6029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:850ad400 r4:850ad400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ad400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859151c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859eb38c r4:859eb000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859eb38c r4:858aa800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ad400 r8:858aa82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aa800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aa800 r8:80287e08 r7:ec9d5e60 r6:858aa880 r5:850ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915100 INFO: task kworker/0:968:6029 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9eed3000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:00000000 r5:84f0cf8c r4:84f0cc00 r4:84ddab80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915280 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:859eb78c r4:859eb400 r7:dddced80 r6:83018000 r5:859eb78c r4:858aa900 r4:00000001 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:970:6033 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:970 state:D stack:0 pid:6033 tgid:6033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9e9d84 r8:00000002 r7:60000013 r6:ec9e9d8c r5:850aec00 r4:850aec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850aec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859154c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:850aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec801000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ebb8c r4:859eb800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ebb8c r4:858aaa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850aec00 r8:858aaa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aaa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aaa00 r8:80287e08 r7:ec9e5e60 r6:858aaa80 r5:850aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e9fb0 to 0xec9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859152c0 INFO: task kworker/0:970:6033 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9f4ad000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 r4:e0581dc0 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ddab80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:971:6034 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec9e1d84 r8:00000002 r7:60000013 r6:ec9e1d8c r5:850ab000 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:850ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:859ec38c r4:859ec000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ec38c r4:858aab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:858aab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aab00 r8:80287e08 r7:ec9e9e60 r6:858aab80 r5:850ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e1fb0 to 0xec9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915600 INFO: task kworker/0:971:6034 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9f4ad000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:972:6037 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:972 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000013 r6:ec9edd8c r5:859aec00 r4:859aec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859aec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915680 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:859aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ebf8c r4:859ebc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ebf8c r4:858aac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859aec00 r8:858aac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aac00 r8:80287e08 r7:ec9e1e60 r6:858aac80 r5:859aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9edfb0 to 0xec9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915640 INFO: task kworker/0:972:6037 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: 9f4ad000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r5:84f0cf8c r4:84f0cc00 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859b8000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b8000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915900 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:859b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ec78c r4:859ec400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ec78c r4:858aad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b8000 r8:858aad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aad00 r8:80287e08 r7:ec9e1e60 r6:858aad80 r5:859b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f5fb0 to 0xec9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915700 INFO: task kworker/0:973:6039 is blocked on a mutex likely owned by task kworker/0:169:3771. r4:00000000 r5:80070013 r4:80239bb0 r4:e0581dc0 r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:84f0cf8c r4:84f0cc00 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:974:6041 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec9f9d84 r8:00000002 r7:60000113 r6:ec9f9d8c r5:859b8c00 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:859ecb8c r4:859ec800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859b8c00 r8:858aae2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:6043 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000013 r6:ec9fdd8c r5:859b9800 r4:859b9800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859b9800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915c40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec873000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ecf8c r4:859ecc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ecf8c r4:858aaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859b9800 r8:858aaf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858aaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858aaf00 r8:80287e08 r7:ec9f9e60 r6:858aaf80 r5:859b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915a00 INFO: task kworker/0:975:6043 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a01b6000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ed78c r4:859ed400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:976:6045 is blocked on a mutex likely owned by task kworker/0:169:3771. 1d60: 80230ad0 80239bb0 80070013 ffffffff [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:977:6047 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:977 state:D stack:0 pid:6047 tgid:6047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:859bb000 r4:859bb000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bb000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915dc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:859bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ed38c r4:859ed000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859ed38c r4:85998100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859bb000 r8:8599812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85998100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85998100 r8:80287e08 r7:eca01e60 r6:85998180 r5:859bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca05fb0 to 0xeca05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85915d00 INFO: task kworker/0:977:6047 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a06b4000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:978:6049 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:978 state:D stack:0 pid:6049 tgid:6049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca09d84 r8:00000002 r7:60000013 r6:eca09d8c r5:859bbc00 r4:859bbc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bbc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924000 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:859bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859edb8c r4:859ed800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859edb8c r4:85998200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859bbc00 r8:8599822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85998200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85998200 r8:80287e08 r7:eca01e60 r6:85998280 r5:859bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0581d28 to 0xe0581d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:859be000 r5:859be000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca15e08 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8585338c r4:85853000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8585338c r4:858ec600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859be000 r8:858ec62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85914a00 INFO: task kworker/1:474:6054 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a0b21000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6055 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6055 tgid:6055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:859bd400 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85852f8c r4:85852c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859bd400 r8:858ec6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:6057 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca21d84 r8:00000002 r7:60000113 r6:eca21d8c r5:859bc800 r4:859bc800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bc800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73580 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8586138c r4:85861000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:858ec780 r8:80287e08 r7:eca15e60 r6:85998400 r5:859bc800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:84518c00 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8af000 r5:859ee38c r4:859ee000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85998480 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 r5:84f0cf8c r4:84f0cc00 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:980:6060 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:980 state:D stack:0 pid:6060 tgid:6060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca2dd84 r8:00000002 r7:60000113 r6:eca2dd8c r5:84519800 r4:84519800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84519800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924540 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84519800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc59000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859edf8c r4:859edc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859edf8c r4:85998580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84519800 r8:859985ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85998580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85998580 r8:80287e08 r7:eca29e60 r6:85998600 r5:84519800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85924640 INFO: task kworker/0:980:6060 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r5:00001000 r4:df927000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r4:8451a400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85914d40 r5:8585378c r4:85853400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8585378c r4:858ec700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451a400 r8:858ec72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ec700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ec700 r8:80287e08 r7:eca21e60 r6:85998680 r5:8451a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85914f00 INFO: task kworker/1:477:6061 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a1743000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6063 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca39d84 r8:00000002 r7:60000013 r6:eca39d8c r5:84518000 r4:84518000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85914e80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84518000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85853b8c r4:85853800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85853b8c r4:858ec800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84518000 r8:858ec82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ec800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ec800 r8:80287e08 r7:eca21e60 r6:85998700 r5:84518000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85914780 INFO: task kworker/1:478:6063 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a1b71000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6065 blocked for more than 477 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:8451b000 r4:8451b000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8451b000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85914fc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8451b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85853f8c r4:85853c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85853f8c r4:858ec880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451b000 r8:858ec8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ec880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ec880 r8:80287e08 r7:eca21e60 r6:85998780 r5:8451b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859145c0 INFO: task kworker/1:479:6065 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a1b71000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:6067 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:6067 tgid:6067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca49d84 r8:00000002 r7:60000113 r6:eca49d8c r5:8451bc00 r4:8451bc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8451bc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca49e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85914440 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8451bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb37000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447b38c r4:8447b000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447b38c r4:858ec900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451bc00 r8:858ec92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ec900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ec900 r8:80287e08 r7:eca21e60 r6:85998800 r5:8451bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84489300 INFO: task kworker/1:480:6067 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a1e40000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:6069 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca51d84 r8:00000002 r7:60000113 r6:eca51d8c r5:8451e000 r4:8451e000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8451e000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73040 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8451e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe3000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586038c r4:85860000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586038c r4:858eca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451e000 r8:858eca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858eca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858eca00 r8:80287e08 r7:eca21e60 r6:85998880 r5:8451e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca51fb0 to 0xeca51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73040 INFO: task kworker/1:481:6069 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2025000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:6071 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:6071 tgid:6071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca59d84 r8:00000002 r7:60000013 r6:eca59d8c r5:8451d400 r4:8451d400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8451d400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73180 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8451d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc07000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586078c r4:85860400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586078c r4:858ec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451d400 r8:858ec9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ec980 r8:80287e08 r7:eca21e60 r6:85998900 r5:8451d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73200 INFO: task kworker/1:482:6071 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2025000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6073 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca61d84 r8:00000002 r7:60000013 r6:eca61d8c r5:859bec00 r4:859bec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859bec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73300 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85860b8c r4:85860800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85860b8c r4:858eca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859bec00 r8:858ecaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858eca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858eca80 r8:80287e08 r7:eca21e60 r6:85998980 r5:859bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca61fb0 to 0xeca61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73140 INFO: task kworker/1:483:6073 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a228d000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:6076 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:6076 tgid:6076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:8451ec00 r4:8451ec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8451ec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8451ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcef000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85860f8c r4:85860c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85860f8c r4:858ecb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8451ec00 r8:858ecb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ecb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ecb00 r8:80287e08 r7:eca21e60 r6:85998a00 r5:8451ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca11fb0 to 0xeca11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73140 INFO: task kworker/1:484:6076 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a228d000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:6079 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca6dd84 r8:00000002 r7:60000113 r6:eca6dd8c r5:859c0c00 r4:859c0c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c0c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca6de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f738c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd5d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85861b8c r4:85861800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85861b8c r4:858ecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859c0c00 r8:858ecbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ecb80 r8:80287e08 r7:eca21e60 r6:85998a80 r5:859c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca6dfb0 to 0xeca6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73700 INFO: task kworker/1:485:6079 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a27ff000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:6080 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:6080 tgid:6080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:859c1800 r4:859c1800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c1800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca71e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73780 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586178c r4:85861400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586178c r4:858ecc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859c1800 r8:858ecc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ecc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ecc00 r8:80287e08 r7:eca6de60 r6:85998b00 r5:859c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73700 INFO: task kworker/1:486:6080 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a27ff000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:6082 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:6082 tgid:6082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eca79d84 r8:00000002 r7:60000113 r6:eca79d8c r5:859c0000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73a00 r5:85861f8c r4:85861c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:858ecc80 r8:80287e08 r7:eca6de60 r6:85998b80 r5:859c0000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca79fb0 to 0xeca79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73980 INFO: task kworker/1:487:6082 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2af4000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:859c3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a1e78c r4:85a1e400 r10:61c88647 r9:859c3000 r8:85998c2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85924180 INFO: task kworker/0:981:6083 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2af4000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8586238c r4:85862000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:858ecd00 r8:80287e08 r7:eca79e60 r6:85998d00 r5:859c3c00 r4:84f739c0 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r5:84f0cf8c r4:84f0cc00 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:84cfd140 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca89e08 r5:85862b8c r4:85862800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85862b8c r4:858ece00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859c5400 r8:858ece2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ece00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ece00 r8:80287e08 r7:eca81e60 r6:85998d80 r5:859c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca89fb0 to 0xeca89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73b00 INFO: task kworker/1:489:6088 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2f75000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:6089 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:6089 tgid:6089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca8dd84 r8:00000002 r7:60000113 r6:eca8dd8c r5:859c6000 r4:859c6000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c6000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8586278c r4:85862400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:858ecd80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f73bc0 INFO: task kworker/1:490:6089 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a2f75000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:982:6092 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:982 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca5dd84 r8:00000002 r7:60000113 r6:eca5dd8c r5:859c6c00 r4:859c6c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c6c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588f5c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8586778c r4:85867400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r4:82ac21e4 r4:e0581dc0 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:6094 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:6094 tgid:6094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca95d84 r8:00000002 r7:60000013 r6:eca95d8c r5:859c2400 r4:859c2400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c2400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca95e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73f00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85862f8c r4:85862c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85862f8c r4:858ece80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859c2400 r8:858eceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ece80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8586378c r4:85863400 r10:61c88647 r9:84df8000 r8:858ecf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecaa1d84 r8:00000002 r7:60000113 r6:ecaa1d8c r5:84df8c00 r4:84df8c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84df8c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84489580 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84df8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec901000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586338c r4:85863000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586338c r4:858ecf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84df8c00 r8:858ecfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858ecf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858ecf80 r8:80287e08 r7:eca9de60 r6:858f6080 r5:84df8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa1fb0 to 0xecaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844895c0 INFO: task kworker/1:493:6097 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a3b46000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 Exception stack(0xe0581fb0 to 0xe0581ff8) INFO: task kworker/1:494:6099 blocked for more than 478 seconds. r4:84dfa400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa9e08 r9:83018205 r8:84dfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:85863b8c r4:85863800 r7:ddde2d80 r6:83018200 r5:85863b8c r4:85900000 r10:00000000 r9:85900000 r8:80287e08 r7:eca9de60 r6:858f6100 r5:84dfa400 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84f0cf8c r4:84f0cc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab1e08 r5:8586578c r4:85865400 r10:61c88647 r9:84dfbc00 r8:859000ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900080 r8:80287e08 r7:ecaa9e60 r6:858f6180 r5:84dfbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f5000 INFO: task kworker/1:495:6101 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a42a3000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 Workqueue: events bpf_prog_free_deferred [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85863f8c r4:85863c00 r10:61c88647 r9:84dfb000 r8:8590012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-rc5-syzkaller #0 r4:84dfd400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5440 r5:8586438c r4:85864000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85900180 r8:80287e08 r7:ecab1e60 r6:858f6280 r5:84dfd400 INFO: task kworker/1:497:6105 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a4695000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:6107 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecacdd84 r8:00000002 r7:60000013 r6:ecacdd8c r5:84df9800 r4:84df9800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84df9800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84df9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586478c r4:85864400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586478c r4:85900200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84df9800 r8:8590022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900200 r8:80287e08 r7:ecab1e60 r6:858f6300 r5:84df9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f5400 INFO: task kworker/1:498:6107 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a489c000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0581fb0 to 0xe0581ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84dfe000 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85864b8c r4:85864800 r10:61c88647 r9:84dfe000 r8:859002ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0581d28 to 0xe0581d70) [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:df927000 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:500 state:D stack:0 pid:6111 tgid:6111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf1d84 r8:00000002 r7:60000013 r6:ecaf1d8c r5:84dfc800 r4:84dfc800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dfc800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f57c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84dfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85864f8c r4:85864c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85864f8c r4:85900300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dfc800 r8:8590032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900300 r8:80287e08 r7:ecab1e60 r6:858f6400 r5:84dfc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf1fb0 to 0xecaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f5600 INFO: task kworker/1:500:6111 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a4a42000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5880 r5:8586538c r4:85865000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84dfec00 r8:859003ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8451c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb05e08 r9:83018205 r8:8451c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 r5:859ee78c r4:859ee400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85900400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:6117 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb15d84 r8:00000002 r7:60000013 r6:ecb15d8c r5:859d8c00 r4:859d8c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d8c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb15e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5bc0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85865b8c r4:85865800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85865b8c r4:85900480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d8c00 r8:859004ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900480 r8:80287e08 r7:ecb05e60 r6:858f6580 r5:859d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f5a00 INFO: task kworker/1:503:6117 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a50d1000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:6119 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85865f8c r4:85865c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r5:84f0cf8c r4:84f0cc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:859d8000 r4:859d8000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859d8000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5ec0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb29000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586638c r4:85866000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586638c r4:85900580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d8000 r8:859005ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900580 r8:80287e08 r7:ecb05e60 r6:858f6680 r5:859d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb31fb0 to 0xecb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858f5c40 INFO: task kworker/1:505:6121 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a53fe000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:6124 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb41d84 r8:00000002 r7:60000113 r6:ecb41d8c r5:859db000 r4:859db000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859db000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb41e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844895c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb39000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586678c r4:85866400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586678c r4:85900600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859db000 r8:8590062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900600 r8:80287e08 r7:ecb05e60 r6:858f6700 r5:859db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb41fb0 to 0xecb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85914000 INFO: task kworker/1:506:6124 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a599f000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:6126 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:6126 tgid:6126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec81dd84 r8:00000002 r7:60000013 r6:ec81dd8c r5:859dbc00 r4:859dbc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859dbc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2000 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85866b8c r4:85866800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85866b8c r4:85900680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859dbc00 r8:859006ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900680 r8:80287e08 r7:ecb41e60 r6:858f6780 r5:859dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2080 INFO: task kworker/1:507:6126 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a5b13000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:6128 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec999d84 r8:00000002 r7:60000113 r6:ec999d8c r5:859dc800 r4:859dc800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859dc800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2800 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb85000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85867f8c r4:85867c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85867f8c r4:85900700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859dc800 r8:8590072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900700 r8:80287e08 r7:ec81de60 r6:858f6800 r5:859dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2100 INFO: task kworker/1:508:6128 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a5dc1000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:6129 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:6129 tgid:6129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:859dd400 r4:859dd400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859dd400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a22c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf27000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85866f8c r4:85866c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85866f8c r4:85900780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859dd400 r8:859007ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900780 r8:80287e08 r7:ec999e60 r6:858f6880 r5:859dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2100 INFO: task kworker/1:509:6129 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a5ef1000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:6132 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:6132 tgid:6132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb1dd84 r8:00000002 r7:60000013 r6:ecb1dd8c r5:859de000 r4:859de000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859de000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2380 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:859de000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586738c r4:85867000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586738c r4:85900800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859de000 r8:8590082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900800 r8:80287e08 r7:ec999e60 r6:858f6900 r5:859de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84cfd140 Workqueue: events bpf_prog_free_deferred r5:859dec00 r4:8291a680 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85867b8c r4:85900880 r10:00000000 r9:85900880 r8:80287e08 r7:ec999e60 r6:858f6980 r5:859dec00 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 INFO: task kworker/0:983:6136 blocked for more than 478 seconds. r4:859d9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca85e08 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859eef8c r4:859eec00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859eef8c r4:858f6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859d9800 r8:858f6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:858f6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6a00 r8:80287e08 r7:eca7de60 r6:858f6a80 r5:859d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca85fb0 to 0xeca85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8588f600 INFO: task kworker/0:983:6136 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a6408000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:6139 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb49d84 r8:00000002 r7:60000013 r6:ecb49d8c r5:85980c00 r4:85980c00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85980c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb49e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2900 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbfd000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586838c r4:85868000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586838c r4:85900900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85980c00 r8:8590092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900900 r8:80287e08 r7:ec999e60 r6:858f6b00 r5:85980c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb49fb0 to 0xecb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a28c0 INFO: task kworker/1:512:6139 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a66d5000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:6141 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586878c r4:85868400 r7:ddde2d80 r6:83018200 r5:8586878c r4:85900980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: a6afd000 e00c3000 00000001 80239b98 7f37f000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85982400 r4:8291a680 r4:00000000 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2e80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85982400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe31000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586938c r4:85869000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586938c r4:85900a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85982400 r8:85900a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900a00 r8:80287e08 r7:ecb51e60 r6:858f6c00 r5:85982400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb55fb0 to 0xecb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2940 INFO: task kworker/1:514:6142 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a6afd000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: a6afd000 e00c3000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85868f8c r4:85868c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85868f8c r4:85900b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85983000 r8:85900b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900b00 r8:80287e08 r7:ecb55e60 r6:858f6d00 r5:85983000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb65fb0 to 0xecb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2b80 INFO: task kworker/1:516:6146 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a6d62000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85900b80 r8:80287e08 r7:ecb55e60 r6:858f6d80 r5:85983c00 r4:858a2d40 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:6151 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:6151 tgid:6151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca0dd84 r8:00000002 r7:60000113 r6:eca0dd8c r5:85985400 r4:85985400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85985400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca0de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588fc00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85985400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ef38c r4:859ef000 r7:dddced80 r6:83018000 r5:859ef38c r4:858f6e00 r10:00000000 r9:858f6e00 r8:80287e08 r7:eca7de60 r6:858f6e80 r5:85985400 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:985:6153 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:985 state:D stack:0 pid:6153 tgid:6153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb69d84 r8:00000002 r7:60000113 r6:ecb69d8c r5:85986000 r4:85986000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85986000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588e500 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ec7c5000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ef78c r4:859ef400 r10:61c88647 r9:85986000 r8:858f6f2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xecb69fb0 to 0xecb69ff8) task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0581dc0 r5:00001000 r4:df927000 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85986c00 r4:8291a680 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85900c00 Exception stack(0xecb71fb0 to 0xecb71ff8) r4:858a2e00 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:6157 blocked for more than 478 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:6157 tgid:6157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb7dd84 r8:00000002 r7:60000113 r6:ecb7dd8c r5:85984800 r4:85984800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85984800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a2600 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85984800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec70d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85869b8c r4:85869800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85869b8c r4:85900c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85984800 r8:85900cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900c80 r8:80287e08 r7:ecb71e60 r6:8588a080 r5:85984800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858a2d40 INFO: task kworker/1:519:6157 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80070013 r4:80239bb0 r4:e0581dc0 r5:00001000 r4:df927000 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85869f8c r4:85869c00 r10:61c88647 r9:850c8c00 r8:85900d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecb85fb0 to 0xecb85ff8) task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec78f000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586a38c r4:8586a000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586a38c r4:85900d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f7b000 r8:85900dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900d80 r8:80287e08 r7:ecb71e60 r6:85900e00 r5:84f7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b9fb0 to 0xec9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85892000 INFO: task kworker/1:521:6160 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a7d07000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:6163 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84f7e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85900e80 r8:80287e08 r7:ecb71e60 r6:85900f00 r5:84f7e000 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:523:6164 blocked for more than 479 seconds. r4:85996c00 r5:85996c00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb75e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858923c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85996c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d5000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586ab8c r4:8586a800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586ab8c r4:85900f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85996c00 r8:85900fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85900f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900f80 r8:80287e08 r7:ecb81e60 r6:85887000 r5:85996c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb75fb0 to 0xecb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85892180 INFO: task kworker/1:523:6164 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a7f87000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84cfd140 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9078c r4:84f90400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f9078c r4:8588a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988000 r8:8588a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8588a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a180 r8:80287e08 r7:eca7de60 r6:85887100 r5:85988000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8588e440 INFO: task kworker/0:986:6167 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a84c1000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586af8c r4:8586ac00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586af8c r4:85887080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988c00 r8:858870ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887080 r8:80287e08 r7:ecb81e60 r6:85887180 r5:85988c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb95fb0 to 0xecb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85892380 INFO: task kworker/1:524:6168 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0581d28 to 0xe0581d70) r4:82ac21e4 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:525:6171 blocked for more than 479 seconds. r5:85989800 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: a8845000 e00c3000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r5:84f0cf8c r4:84f0cc00 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 INFO: task kworker/1:526:6172 blocked for more than 479 seconds. r4:8598a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r5:00001000 r4:ec837000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85887300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a8845000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:6174 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb9dd84 r8:00000002 r7:60000013 r6:ecb9dd8c r5:8598b000 r4:8598b000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598b000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85892a40 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8598b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8586bb8c r4:8586b800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8586bb8c r4:85887400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598b000 r8:8588742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887400 r8:80287e08 r7:ecb91e60 r6:85887480 r5:8598b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85892b80 INFO: task kworker/1:527:6174 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a89ac000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:00001000 r4:df927000 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9038c r4:84f90000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:82ac21e4 r4:00000000 r5:84f0cf8c r4:84f0cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84f90b8c r4:85887600 r10:00000000 r9:85887600 r8:80287e08 r7:ecba1e60 r6:85887680 r5:8598d400 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a91e6000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:6180 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:6180 tgid:6180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbadd84 r8:00000002 r7:60000113 r6:ecbadd8c r5:8598e000 r4:8598e000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598e000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbade08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858731c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8598e000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98f000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f90f8c r4:84f90c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f90f8c r4:85887700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598e000 r8:8588772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887700 r8:80287e08 r7:ecba5e60 r6:85887780 r5:8598e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbadfb0 to 0xecbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:987:6182 blocked for more than 479 seconds. r5:850ca400 r4:8291a680 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859eff8c r4:859efc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859eff8c r4:8588a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ca400 r8:8588a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8588a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a200 r8:80287e08 r7:eca7de60 r6:8588a280 r5:850ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8588ea80 INFO: task kworker/0:987:6182 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a9718000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84cfd140 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ecbb9d84 r8:00000002 r7:60000013 r6:ecbb9d8c r5:850cc800 r4:850cc800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850cc800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858732c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9138c r4:84f91000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f9138c r4:85887800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cc800 r8:8588782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887800 r8:80287e08 r7:ecbade60 r6:8588a300 r5:850cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858730c0 INFO: task kworker/1:531:6185 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: a9aa3000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:82ac21e4 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:6189 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:6189 tgid:6189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:850cec00 r4:850cec00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850cec00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858736c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f91f8c r4:84f91c00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f91f8c r4:85887900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cec00 r8:8588792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887900 r8:80287e08 r7:ecbc1e60 r6:8588a400 r5:850cec00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84f91b8c r4:85887980 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:850cbc00 r4:850cbc00 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850cbc00 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873780 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cb000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9238c r4:84f92000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f9238c r4:85887a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cbc00 r8:85887a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887a00 r8:80287e08 r7:ec87de60 r6:8588a500 r5:850cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca75fb0 to 0xeca75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85873640 INFO: task kworker/1:535:6193 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: aadf2000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecac5d84 r8:00000002 r7:60000013 r6:ecac5d8c r5:850c9800 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850c9800 r8:85887aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:537:6197 blocked for more than 479 seconds. r4:850cb000 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac9e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873b00 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba29000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f92b8c r4:84f92800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f92b8c r4:85887b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cb000 r8:85887b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887b00 r8:80287e08 r7:ecac5e60 r6:8588a600 r5:850cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858737c0 INFO: task kworker/1:537:6197 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: aadf2000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:6199 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:6199 tgid:6199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae5d84 r8:00000002 r7:60000013 r6:ecae5d8c r5:859c4800 r4:859c4800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859c4800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85887b80 r8:80287e08 r7:ecac9e60 r6:8588a680 r5:859c4800 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:6201 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:6201 tgid:6201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca65d84 r8:00000002 r7:60000013 r6:eca65d8c r5:8598c800 r4:8598c800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598c800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca65e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873c80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8598c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf7000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85873c40 INFO: task kworker/1:539:6201 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: ab413000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ddab80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9378c r4:84f93400 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f9378c r4:85887d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85970000 r8:85887d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887d00 r8:80287e08 r7:eca65e60 r6:85887d80 r5:85970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84766b8c r4:84766800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8588a700 r8:80287e08 r7:eca7de60 r6:8588a780 r5:84d80c00 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:989:6208 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:6208 tgid:6208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf5d84 r8:00000002 r7:60000113 r6:ecaf5d8c r5:84d81800 r4:84d81800 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d81800 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e3640 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d81800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd73000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8476538c r4:84765000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8476538c r4:8588a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d81800 r8:8588a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8588a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a800 r8:80287e08 r7:eca7de60 r6:8588a880 r5:84d81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 Exception stack(0xe0581fb0 to 0xe0581ff8) INFO: task kworker/1:541:6209 blocked for more than 479 seconds. r10:8291a684 r9:ecbd1d84 r8:00000002 r7:60000113 r6:ecbd1d8c r5:84d82400 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84f93b8c r4:84f93800 r7:ddde2d80 r6:83018200 r5:84f93b8c r4:85887e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d82400 r8:85887e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887e00 r8:80287e08 r7:ecb19e60 r6:8588a900 r5:84d82400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8588ef00 INFO: task kworker/1:541:6209 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: abbc2000 e00c3000 00000001 80239b98 7f37f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xecbcdfb0 to 0xecbcdff8) 1d20: abbc2000 e00c3000 00000001 80239b98 7f37f000 00000001 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:991 state:D stack:0 pid:6214 tgid:6214 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85a1c78c r4:8588aa80 r4:8588aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588aa80 r8:80287e08 r7:eca7de60 r6:8588ab00 r5:84d83c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd9fb0 to 0xecbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e3a00 INFO: task kworker/0:991:6214 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: ac169000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc5-syzkaller #0 r5:84d84800 r4:8291a680 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: ac452000 e00c3000 00000001 80239b98 7f37f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:6217 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:84d85400 r4:84d85400 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d85400 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e3c80 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84d85400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ff000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a1cb8c r4:85a1c800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a1cb8c r4:8588ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d85400 r8:8588ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8588ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588ac00 r8:80287e08 r7:eca7de60 r6:8588ac80 r5:84d85400 r4:00000001 Exception stack(0xecbe1fb0 to 0xecbe1ff8) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: ac649000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:6219 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe5d84 r8:00000002 r7:60000113 r6:ecbe5d8c r5:84d86000 r4:84d86000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d86000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf400 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84d86000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93d000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f9438c r4:84f94000 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f9438c r4:85887f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d86000 r8:85887f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85887f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85887f00 r8:80287e08 r7:ecbd5e60 r6:8588ad00 r5:84d86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe5fb0 to 0xecbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: ac649000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:e0581dc0 [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84fb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df927000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f0cf8c r4:84f0cc00 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84f0cf8c r4:84ddab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84fb0c00 r8:84ddabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ddab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:993:6222 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:993 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d20: aca68000 e00c3000 00000001 80239b98 7f37f000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cfd7c0 [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84ddab80 r8:80287e08 r7:e0561e60 r6:84ec1a00 r5:84fb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cfd140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:6224 blocked for more than 479 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:6224 tgid:6224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a53c68>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ce4>] (__schedule) from [<81a53c68>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:85940000 r4:85940000 [<81a53c3c>] (schedule) from [<81a54050>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85940000 r4:8291a680 [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54038>] (schedule_preempt_disabled) from [<81a56734>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56434>] (__mutex_lock.constprop.0) from [<81a56c00>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a56bec>] (__mutex_lock_slowpath) from [<81a56c40>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7898>] (_vm_unmap_aliases) from [<804eb7e0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf4c0 r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84f9478c r4:85887f80 r10:00000000 r9:85887f80 r8:80287e08 r7:ecbe5e60 r6:8588ae80 r5:85940000 r4:856cf380 Call trace: Exception stack(0xe0581d28 to 0xe0581d70) r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0581dc0 r5:e0581e08 r4:00000000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ddab80 Exception stack(0xe0581fb0 to 0xe0581ff8) INFO: task kworker/1:545:6226 blocked for more than 479 seconds. r5:85941800 r4:8291a680 [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb678>] (vfree) from [<8054b254>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85941800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b224>] (execmem_free) from [<803cc374>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1b000 [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc364>] (bpf_jit_free_exec) from [<803cc754>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc6ec>] (bpf_jit_free) from [<803cd8b0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f94b8c r4:84f94800 [<803cd764>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f94b8c r4:84fa8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85941800 r8:84fa802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fa8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa8000 r8:80287e08 r7:ecbf5e60 r6:8588af00 r5:85941800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856cf500 INFO: task kworker/1:545:6226 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: acd1b000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e76d4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:df927000 r4:84ddab80 Exception stack(0xe0581fb0 to 0xe0581ff8) Workqueue: events bpf_prog_free_deferred [<81a56c04>] (mutex_lock) from [<804e7900>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:85942400 r8:84fa80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856cf500 INFO: task kworker/1:546:6227 is blocked on a mutex likely owned by task kworker/0:169:3771. task:kworker/0:169 state:R running task stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ce4>] (__schedule) from [<81a5409c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84fb0c00 r8:80200be4 r7:e0581d5c r6:ffffffff r5:84fb0c00 r4:00000000 [<81a5405c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0581d28 to 0xe0581d70) 1d20: ad166000 e00c3000 00000001 80239b98 7f37f000 00000001 1d40: 82ac15a0 7f37f000 e00c3000 8280c928 82ac21c4 e0581da4 e0581da8 e0581d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<804e74c4>] (__purge_vmap_area_lazy) from [<804e7a7c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:84f0cf8c r4:84f0cc00