Extracting prog: 11m45.97384262s Minimizing prog: 2h7m59.609393819s Simplifying prog options: 0s Extracting C: 9m1.719432859s Simplifying C: 59m0.409400403s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$MAP_UPDATE_ELEM_TAIL_CALL detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE-bpf$MAP_UPDATE_ELEM_TAIL_CALL detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 5 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-bpf$MAP_CREATE detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD detailed listing: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x3, 0x8, 0x7, 0x140, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$MAP_CREATE-bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h27m47.712097072s repro crashed as (corrupted=false): INFO: task kworker/1:1:86 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:86 tgid:86 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:832e8c00 r4:832e8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832e8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858213c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594638c r4:85946000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594638c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832e8c00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:df879e60 r6:832a0180 r5:832e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832cb300 INFO: task kworker/1:1:86 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2a41000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:2:720 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:720 tgid:720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0559d84 r8:00000002 r7:60000013 r6:e0559d8c r5:83881800 r4:83881800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83881800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83881800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec61d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593a38c r4:8593a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593a38c r4:83c34b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83881800 r8:83c34b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83c34b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c34b00 r8:80287e08 r7:df879e60 r6:83c34b80 r5:83881800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0559fb0 to 0xe0559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83c23f00 INFO: task kworker/1:2:720 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2a41000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:0:3099 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3099 tgid:3099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000013 r6:eb231d8c r5:832fe000 r4:832fe000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fe000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577eb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb31000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593b38c r4:8593b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593b38c r4:84822b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fe000 r8:84822bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822b80 r8:80287e08 r7:df9b9e60 r6:84822c00 r5:832fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5bc0 INFO: task kworker/1:0:3099 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2fcc000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:3:3116 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df995d84 r8:00000002 r7:60000113 r6:df995d8c r5:832fec00 r4:832fec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df995e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:832fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc07000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85948b8c r4:85948800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85948b8c r4:84822780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fec00 r8:848227ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822780 r8:80287e08 r7:df9b9e60 r6:84822f80 r5:832fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf995fb0 to 0xdf995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849fb4c0 INFO: task kworker/1:3:3116 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e2fcc000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:9:3145 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83cd8000 r4:83cd8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cd8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529cb80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550b78c r4:8550b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550b78c r4:84922480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cd8000 r8:849224ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922480 r8:80287e08 r7:df9d1e60 r6:84922500 r5:83cd8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84701180 INFO: task kworker/1:9:3145 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e358b000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/1:10:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:83cdb000 r4:83cdb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cdb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:83cdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594538c r4:85945000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594538c r4:84922580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cdb000 r8:849225ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922580 r8:80287e08 r7:df9c5e60 r6:84922600 r5:83cdb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84231080 INFO: task kworker/1:10:3146 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e358b000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:12:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b2b000 r4:83b2b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 INFO: task kworker/0:12:3148 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e3b31000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:13:3150 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83b2ec00 r4:83b2ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559bb8c r4:8559b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559bb8c r4:849f1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2ec00 r8:849f16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1680 r8:80287e08 r7:df9dde60 r6:849f1700 r5:83b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 INFO: task kworker/0:13:3150 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e40db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:14:3152 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83a69800 r4:83a69800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a69800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7adc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a69800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b238c r4:853b2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b238c r4:849f1780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a69800 r8:849f17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1780 r8:80287e08 r7:dfa79e60 r6:84922680 r5:83a69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:846e8c80 INFO: task kworker/0:14:3152 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e40db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 INFO: task kworker/0:15:3154 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83252400 r4:83252400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83252400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e091b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2b8c r4:853b2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2b8c r4:849f1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83252400 r8:849f182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1800 r8:80287e08 r7:dfa79e60 r6:849f1880 r5:83252400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c340 INFO: task kworker/0:15:3154 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e466e000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83236000 r4:83236000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ea880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b3f8c r4:853b3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3f8c r4:849f1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:849f192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1900 r8:80287e08 r7:dfa79e60 r6:849f1980 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c1c0 INFO: task kworker/0:16:3156 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e466e000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3157 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:844b1800 r4:844b1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c780 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548678c r4:85486400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548678c r4:849f1a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b1800 r8:849f1a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1a00 r8:80287e08 r7:dfa79e60 r6:849f1a80 r5:844b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c4c0 INFO: task kworker/0:17:3157 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e4f05000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3160 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:844b3c00 r4:844b3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85545940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854abf8c r4:854abc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854abf8c r4:84922700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b3c00 r8:8492272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922700 r8:80287e08 r7:dfa59e60 r6:849f1b00 r5:844b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813180 INFO: task kworker/1:11:3160 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e4f05000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3162 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:844b0000 r4:844b0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562cf8c r4:8562cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562cf8c r4:849f1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b0000 r8:849f1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1b80 r8:80287e08 r7:dfa79e60 r6:849f1c00 r5:844b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473c940 INFO: task kworker/0:18:3162 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e50db000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad5d84 r8:00000002 r7:60000013 r6:dfad5d8c r5:844b0c00 r4:844b0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85623c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb425000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c178c r4:855c1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c178c r4:84922800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b0c00 r8:8492282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922800 r8:80287e08 r7:dfa59e60 r6:849f1c80 r5:844b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813680 INFO: task kworker/1:12:3164 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5865000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3165 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:844b3000 r4:844b3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:844b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593ab8c r4:8593a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593ab8c r4:84922880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b3000 r8:849228ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84922880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84922880 r8:80287e08 r7:dfa59e60 r6:849f1d00 r5:844b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813680 INFO: task kworker/1:13:3165 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5865000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3168 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83a78000 r4:83a78000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a78000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a78000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847eef8c r4:847eec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847eef8c r4:849f1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a78000 r8:849f1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1d80 r8:80287e08 r7:dfacde60 r6:84922900 r5:83a78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473ce80 INFO: task kworker/0:19:3168 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5acd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3170 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:833aec00 r4:833aec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833aec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ae00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:833aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565138c r4:85651000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565138c r4:849f1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833aec00 r8:849f1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1e00 r8:80287e08 r7:dfab5e60 r6:84922980 r5:833aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473cd80 INFO: task kworker/0:20:3170 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e5acd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3171 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83a68000 r4:83a68000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a68000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583f900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83a68000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec637000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565278c r4:85652400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565278c r4:849f1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a68000 r8:849f1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1e80 r8:80287e08 r7:dfae5e60 r6:84922a00 r5:83a68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473cb40 INFO: task kworker/0:21:3171 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6425000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3173 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83886000 r4:83886000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83886000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eae00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83886000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85651f8c r4:85651c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85651f8c r4:830b8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83886000 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:80287e08 r7:dfae9e60 r6:84922a80 r5:83886000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a000 INFO: task kworker/0:22:3173 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6425000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3175 blocked for more than 450 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:8394a400 r4:8394a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8394a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570ef00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8394a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb821000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565238c r4:85652000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565238c r4:830b8700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8394a400 r8:830b872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:80287e08 r7:dfae9e60 r6:84922b00 r5:8394a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a040 INFO: task kworker/0:23:3175 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e66f5000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3177 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83880000 r4:83880000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83880000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fefc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83880000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaeb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83880000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfae9e60 r6:84922b80 r5:83880000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:24:3177 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e66f5000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83b05400 r4:83b05400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b05400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583fcc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b05400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec69d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565338c r4:85653000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565338c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b05400 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:dfb09e60 r6:84922c00 r5:83b05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a480 INFO: task kworker/0:25:3179 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6bfd000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83b02400 r4:83b02400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b02400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856288c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b02400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576678c r4:85766400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576678c r4:84550700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b02400 r8:8455072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84550700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84550700 r8:80287e08 r7:dfb09e60 r6:84922c80 r5:83b02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:26:3181 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e6e70000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3184 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83b00c00 r4:83b00c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec653000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576478c r4:85764400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576478c r4:8480b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:8480b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b780 r8:80287e08 r7:dfb2de60 r6:84922d00 r5:83b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:27:3184 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e70d6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83b00000 r4:83b00000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b00000 r7:00000000 r6:83018000 r5:00001000 r4:7f0fd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec781000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493cf8c r4:8493cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493cf8c r4:8480b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00000 r8:8480b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b700 r8:80287e08 r7:dfb2de60 r6:84922d80 r5:83b00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a300 INFO: task kworker/0:28:3187 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e730d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83b06000 r4:83b06000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b06000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847505c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b06000 r7:00000000 r6:83018000 r5:00001000 r4:7f0fb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec717000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493ef8c r4:8493ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493ef8c r4:8480b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b06000 r8:8480b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b400 r8:80287e08 r7:dfb4de60 r6:84922e00 r5:83b06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420a840 INFO: task kworker/0:29:3188 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7562000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3191 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000013 r6:dfb69d8c r5:8386d400 r4:8386d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fee40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8386d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493db8c r4:8493d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493db8c r4:8480b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386d400 r8:8480b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b200 r8:80287e08 r7:dfb59e60 r6:84922e80 r5:8386d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ac80 INFO: task kworker/0:30:3191 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7766000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:83869800 r4:83869800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83869800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84750b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83869800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493eb8c r4:8493e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493eb8c r4:8480bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83869800 r8:8480bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480bf80 r8:80287e08 r7:dfb69e60 r6:84922f00 r5:83869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:31:3192 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7bd6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83b01800 r4:83b01800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b01800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec629000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493cb8c r4:8493c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493cb8c r4:8480bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b01800 r8:8480bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480bf00 r8:80287e08 r7:dfb69e60 r6:84922f80 r5:83b01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ad40 INFO: task kworker/0:32:3194 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e7bd6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb85d84 r8:00000002 r7:60000013 r6:dfb85d8c r5:83b03c00 r4:83b03c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b03c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a033c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c778c r4:859c7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859c778c r4:8480be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b03c00 r8:8480beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480be80 r8:80287e08 r7:dfb69e60 r6:84922780 r5:83b03c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84813dc0 INFO: task kworker/0:33:3195 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8181000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:83868000 r4:83868000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83868000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83868000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd41000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493d78c r4:8493d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493d78c r4:849f1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83868000 r8:849f1f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1f00 r8:80287e08 r7:dfb69e60 r6:83348880 r5:83868000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:34:3197 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8181000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84aa0c00 r4:84aa0c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa0c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feb00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493ff8c r4:8493fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493ff8c r4:849f1f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa0c00 r8:849f1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1f80 r8:80287e08 r7:dfb69e60 r6:83348800 r5:84aa0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420af40 INFO: task kworker/0:35:3199 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8523000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3201 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:844b6c00 r4:844b6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb91000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493df8c r4:8493dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493df8c r4:8474b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b6c00 r8:8474b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b000 r8:80287e08 r7:dfb69e60 r6:8474b080 r5:844b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750100 INFO: task kworker/0:36:3201 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e89b7000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3204 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:844b6000 r4:844b6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859febc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493e38c r4:8493e000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493e38c r4:8474b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b6000 r8:8474b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b100 r8:80287e08 r7:dfb69e60 r6:8474b180 r5:844b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750200 INFO: task kworker/0:37:3204 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e89b7000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3206 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:844b5400 r4:844b5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fea40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493f38c r4:8493f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493f38c r4:8474b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b5400 r8:8474b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b200 r8:80287e08 r7:dfba5e60 r6:8474b280 r5:844b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847500c0 INFO: task kworker/0:38:3206 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:844b2400 r4:844b2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859feac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb919000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493c78c r4:8493c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493c78c r4:8474b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b2400 r8:8474b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b300 r8:80287e08 r7:dfbb9e60 r6:8474b380 r5:844b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750300 INFO: task kworker/0:39:3208 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000013 r6:dfbcdd8c r5:844b4800 r4:844b4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844b4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:844b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493fb8c r4:8493f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493fb8c r4:8474b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b4800 r8:8474b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b400 r8:80287e08 r7:dfbb9e60 r6:8474b480 r5:844b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750700 INFO: task kworker/0:40:3210 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e8cc4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3212 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:832ea400 r4:832ea400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832ea400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a08ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:832ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859fa78c r4:859fa400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859fa78c r4:8474b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832ea400 r8:8474b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b500 r8:80287e08 r7:dfbcde60 r6:8474b580 r5:832ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750880 INFO: task kworker/0:41:3212 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9377000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3213 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:83238c00 r4:83238c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fe880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493e78c r4:8493e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493e78c r4:8474b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238c00 r8:8474b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b600 r8:80287e08 r7:dfbe1e60 r6:8474b680 r5:83238c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750980 INFO: task kworker/0:42:3213 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9377000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3217 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84911800 r4:84911800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84911800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a9d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84911800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1b8c r4:859b1800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b1b8c r4:8474b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84911800 r8:8474b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b700 r8:80287e08 r7:dfbe1e60 r6:8474b780 r5:84911800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84750e80 INFO: task kworker/0:43:3217 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3219 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84912400 r4:84912400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84912400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a31680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84912400 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b038c r4:859b0000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b038c r4:8474b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84912400 r8:8474b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b800 r8:80287e08 r7:dfbe1e60 r6:8474b880 r5:84912400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f140 INFO: task kworker/0:44:3219 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3221 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84913000 r4:84913000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84913000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b50c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84913000 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84791b8c r4:84791800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84791b8c r4:8474b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84913000 r8:8474b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b900 r8:80287e08 r7:dfbe1e60 r6:8474b980 r5:84913000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f3c0 INFO: task kworker/0:45:3221 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e97d4000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3223 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84aa2400 r4:84aa2400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa2400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f1240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f215000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479278c r4:84792400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479278c r4:8474ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa2400 r8:8474ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ba00 r8:80287e08 r7:dfc15e60 r6:84762000 r5:84aa2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f000 INFO: task kworker/0:46:3223 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9c73000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3226 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:84aa0000 r4:84aa0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa0000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475f9c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa0000 r7:00000000 r6:83018000 r5:00001000 r4:7f213000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b3f8c r4:859b3c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b3f8c r4:8474ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa0000 r8:8474baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474ba80 r8:80287e08 r7:dfc1de60 r6:84762080 r5:84aa0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f700 INFO: task kworker/0:47:3226 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9c73000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3227 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84aa3000 r4:84aa3000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f1dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b3b8c r4:859b3800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:859b3b8c r4:8474bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa3000 r8:8474bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bb00 r8:80287e08 r7:dfc35e60 r6:84762100 r5:84aa3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f840 INFO: task kworker/0:48:3227 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9f1c000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3229 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:84913c00 r4:84913c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84913c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599e800 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84913c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ef000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9838c r4:85b98000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b9838c r4:8474bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84913c00 r8:8474bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bb80 r8:80287e08 r7:dfc41e60 r6:8474bc00 r5:84913c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475f900 INFO: task kworker/0:49:3229 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: e9f1c000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3233 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84aa4800 r4:84aa4800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa4800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577ecc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593bb8c r4:8593b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593bb8c r4:84762180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa4800 r8:847621ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762180 r8:80287e08 r7:dfa59e60 r6:84762200 r5:84aa4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474dc00 INFO: task kworker/1:14:3233 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea20a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000013 r6:dfbedd8c r5:84aa5400 r4:84aa5400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa5400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578a600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b97f8c r4:85b97c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85b97f8c r4:8474bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa5400 r8:8474bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bc80 r8:80287e08 r7:dfc31e60 r6:84762280 r5:84aa5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475fb00 INFO: task kworker/0:50:3234 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea20a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3236 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:84aa6000 r4:84aa6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc4f8c r4:85bc4c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc4f8c r4:8474bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa6000 r8:8474bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bd00 r8:80287e08 r7:dfbede60 r6:84762300 r5:84aa6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475ff40 INFO: task kworker/0:51:3236 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea99f000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3237 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84914800 r4:84914800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84914800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84914800 r7:00000000 r6:83018000 r5:00001000 r4:7f305000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bc778c r4:85bc7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bc778c r4:8474bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84914800 r8:8474bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bd80 r8:80287e08 r7:df9e9e60 r6:8474be00 r5:84914800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475fdc0 INFO: task kworker/0:52:3237 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ea99f000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3240 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df971d84 r8:00000002 r7:60000013 r6:df971d8c r5:84aa6c00 r4:84aa6c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa6c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577e900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:84aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb83000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594438c r4:85944000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8594438c r4:84762380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa6c00 r8:847623ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762380 r8:80287e08 r7:dfa59e60 r6:84762400 r5:84aa6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474d300 INFO: task kworker/1:15:3240 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eac06000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3242 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84aa1800 r4:84aa1800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa1800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa1800 r7:00000000 r6:83018000 r5:00001000 r4:7f47b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdbb8c r4:85bdb800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdbb8c r4:8474be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa1800 r8:8474beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474be80 r8:80287e08 r7:df9e9e60 r6:84762480 r5:84aa1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8420ab00 INFO: task kworker/0:53:3242 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eac06000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3244 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84aa3c00 r4:84aa3c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aa3c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a31b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd8f8c r4:85bd8c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd8f8c r4:8480b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aa3c00 r8:8480b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8480b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8480b600 r8:80287e08 r7:dfc4de60 r6:84762500 r5:84aa3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b080 INFO: task kworker/0:54:3244 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eae99000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3247 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84480c00 r4:84480c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84480c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84480c00 r7:00000000 r6:83018000 r5:00001000 r4:7f479000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed185000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdb78c r4:85bdb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdb78c r4:8474bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84480c00 r8:8474bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bf00 r8:80287e08 r7:dfc4de60 r6:84762580 r5:84480c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b1c0 INFO: task kworker/0:55:3247 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eae99000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3249 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84482400 r4:84482400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84482400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475b440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84482400 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd93000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdab8c r4:85bda800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdab8c r4:84761000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84482400 r8:8476102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761000 r8:80287e08 r7:dfc59e60 r6:84762600 r5:84482400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b280 INFO: task kworker/0:56:3249 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb35d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3250 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84483000 r4:84483000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84483000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85993200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84483000 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece33000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bda78c r4:85bda400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bda78c r4:84761100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84483000 r8:8476112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761100 r8:80287e08 r7:dfc61e60 r6:84762680 r5:84483000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b5c0 INFO: task kworker/0:57:3250 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb35d000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3252 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:84481800 r4:84481800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84481800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85993000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84481800 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd9f8c r4:85bd9c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd9f8c r4:84761080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84481800 r8:847610ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761080 r8:80287e08 r7:dfc61e60 r6:84762700 r5:84481800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b580 INFO: task kworker/0:58:3252 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb5ef000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3255 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000013 r6:dfc79d8c r5:84483c00 r4:84483c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84483c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8475b700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bd878c r4:85bd8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bd878c r4:84761180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84483c00 r8:847611ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761180 r8:80287e08 r7:dfc61e60 r6:84762780 r5:84483c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b700 INFO: task kworker/0:59:3255 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: eb9d6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3256 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84486000 r4:84486000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84486000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85944b8c r4:85944800 r7:ddde2d80 r6:83018200 r5:85944b8c r4:84762800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeb28dd28 to 0xeb28dd70) dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3257 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:84484800 r4:84484800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84484800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c74b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84484800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bda38c r4:85bda000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bda38c r4:84761200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84484800 r8:8476122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfc81fb0 to 0xdfc81ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeb28dd28 to 0xeb28dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r5:00001000 r4:eafb1000 r4:850f5b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bdb38c r4:85bdb000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bdb38c r4:84761380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84486c00 r8:847613ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761380 r8:80287e08 r7:dfc81e60 r6:84762980 r5:84486c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475b900 INFO: task kworker/0:61:3259 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec140000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8484c9c0 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:edcdb000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85dbdf8c r4:84761400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577a7c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f55b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed509000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479cb8c r4:8479c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479cb8c r4:84761480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8c00 r8:847614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761480 r8:80287e08 r7:dfc89e60 r6:84762a80 r5:848d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475bf00 INFO: task kworker/0:63:3265 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec537000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3266 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 task:kworker/0:64 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a33340 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479eb8c r4:8479e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484c9c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3268 blocked for more than 451 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:848d8000 r4:848d8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4f100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f5bb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca6f8c r4:85ca6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca6f8c r4:84761580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d8000 r8:847615ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761580 r8:80287e08 r7:dfc89e60 r6:84762b80 r5:848d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8475ba00 INFO: task kworker/0:65:3268 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec86a000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 r10:00000000 r9:850f5b00 r8:80287e08 r7:eb285e60 r6:850f5b80 r5:85338000 r4:8484c9c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848da400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bea38c r4:85bea000 r7:dddced80 r6:83018000 r5:85bea38c r4:84761600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848da400 r8:8476162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761600 r8:80287e08 r7:dfc89e60 r6:84762c00 r5:848da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953080 INFO: task kworker/0:66:3271 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85338000 r8:80200be4 r7:eb28dd5c r6:ffffffff r5:85338000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb28dd28 to 0xeb28dd70) dd20: ec9c6000 eccab000 00000001 80239b98 7f437000 00000001 dd40: 82ac15a0 7f437000 eccab000 8280c928 82ac21c4 eb28dda4 eb28dda8 eb28dd78 dd60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb28ddc0 r5:eb28de08 r4:eb28ddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cc00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853c6f8c r4:850f5b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:67 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84916000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84916000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6b6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84916000 r7:00000000 r6:83018000 r5:00001000 r4:7f605000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed845000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbdb8c r4:85dbd800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbdb8c r4:84761680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84916000 r8:847616ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761680 r8:80287e08 r7:dfc89e60 r6:84761700 r5:84916000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953040 INFO: task kworker/0:67:3272 is blocked on a mutex likely owned by task kworker/1:479:4779. task:kworker/1:479 state:R running task stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: ec9c6000 eccab000 00000001 80239b98 7f437000 00000001 r7:00000000 r6:ffffffff r5:8281c9a0 r4:00000000 r10:61c88647 r9:85338000 r8:850f5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85946b8c r4:85946800 r10:61c88647 r9:848db000 r8:84762cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494de40 Call trace: 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 r4:00000000 r5:853c5f8c r4:853c5c00 r4:850f5d80 Exception stack(0xeb291fb0 to 0xeb291ff8) r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3275 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:848dc800 r4:848dc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85821200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:848dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85945b8c r4:85945800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85945b8c r4:84762d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dc800 r8:84762dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84762d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84762d80 r8:80287e08 r7:dfca9e60 r6:84762e00 r5:848dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8494dd40 INFO: task kworker/1:18:3275 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7f85a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:853c5f8c r4:853c5c00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848dd400 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dbf38c r4:85dbf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbf38c r4:84761780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dd400 r8:847617ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761780 r8:80287e08 r7:dfc89e60 r6:84762e80 r5:848dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849532c0 INFO: task kworker/0:68:3278 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7f85a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3280 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:848de000 r4:848de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbd78c r4:85dbd400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbd78c r4:84761800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84761800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeb291d28 to 0xeb291d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3282 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:848dec00 r4:848dec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f711000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcdd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbeb8c r4:85dbe800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dbeb8c r4:84761880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dec00 r8:847618ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761880 r8:80287e08 r7:dfcbde60 r6:84762f80 r5:848dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 1d60: 80230ad0 80239bb0 90000113 ffffffff r4:eb291dc0 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582e240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:848dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed887000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8493f78c r4:8493f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8493f78c r4:84761900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dbc00 r8:8476192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761900 r8:80287e08 r7:dfcbde60 r6:84959000 r5:848dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953500 INFO: task kworker/0:71:3284 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 7fe04000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 90000113 ffffffff r5:90000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dbe38c r4:85dbe000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84761980 r8:80287e08 r7:dfcdde60 r6:84959080 r5:8394bc00 task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 801ea000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3288 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84485400 r4:84485400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84485400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e726c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ecf43000 r5:8496038c r4:84960000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496038c r4:84761a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84485400 r8:84761a2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3290 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf9d84 r8:00000002 r7:60000013 r6:dfcf9d8c r5:849b8000 r4:849b8000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f7f1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496138c r4:84961000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496138c r4:84761a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8000 r8:84761aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761a80 r8:80287e08 r7:dfcf5e60 r6:84959180 r5:849b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953cc0 INFO: task kworker/0:74:3290 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80ab5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3293 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:849b8c00 r4:849b8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d6de40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f88d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee16b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e6938c r4:85e69000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e6938c r4:84761b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8c00 r8:84761b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761b00 r8:80287e08 r7:dfcf9e60 r6:84959200 r5:849b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953e40 INFO: task kworker/0:75:3293 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80ab5000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3295 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:849b9800 r4:849b9800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b9800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e75bc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f8c3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc178c r4:85dc1400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc178c r4:84761b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b9800 r8:84761bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761b80 r8:80287e08 r7:dfc49e60 r6:84959280 r5:849b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953e40 INFO: task kworker/0:76:3295 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 80e70000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3297 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:849ba400 r4:849ba400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ba400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473c540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f8dd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc238c r4:85dc2000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc238c r4:84761c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ba400 r8:84761c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761c00 r8:80287e08 r7:dfd15e60 r6:84959300 r5:849ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953bc0 INFO: task kworker/0:77:3297 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 8108a000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 r5:853c5f8c r4:853c5c00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3299 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:849bb000 r4:849bb000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bb000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f8f9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed725000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc2f8c r4:85dc2c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc2f8c r4:84761c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bb000 r8:84761cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761c80 r8:80287e08 r7:dfd1de60 r6:84959380 r5:849bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953500 INFO: task kworker/0:78:3299 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 811f2000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3301 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:849bbc00 r4:849bbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74380 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb57000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8479d78c r4:8479d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8479d78c r4:84761d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bbc00 r8:84761d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761d00 r8:80287e08 r7:dfaf9e60 r6:84959400 r5:849bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954140 INFO: task kworker/0:79:3301 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80000113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3302 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:849bc800 r4:849bc800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bc800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b15180 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f8dd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc2b8c r4:85dc2800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc2b8c r4:84761d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bc800 r8:84761dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761d80 r8:80287e08 r7:dfb05e60 r6:84959480 r5:849bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954140 INFO: task kworker/0:80:3302 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 81636000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb291dc0 r5:eb291e08 r4:eb291dc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 INFO: task kworker/1:20:3307 blocked for more than 452 seconds. r4:849be000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8594738c r4:85947000 r7:ddde2d80 r6:83018200 r5:8594738c r4:84959600 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80000113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533bc00 r8:850f5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3309 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3309 tgid:3309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:849bec00 r4:849bec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74240 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849bec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb55000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4e3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496438c r4:84964000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496438c r4:84761e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bec00 r8:84761e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84761e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84761e00 r8:80287e08 r7:dfb05e60 r6:84959700 r5:849bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84954580 INFO: task kworker/0:81:3309 is blocked on a mutex likely owned by task kworker/1:480:4781. task:kworker/1:480 state:R running task stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8533bc00 r8:80200be4 r7:eb291d5c r6:ffffffff r5:8533bc00 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb291d28 to 0xeb291d70) 1d20: 81c5e000 eafa9000 00000001 80239b98 7f439000 00000001 1d40: 82ac15a0 7f439000 eafa9000 8280c928 82ac21c4 eb291da4 eb291da8 eb291d78 1d60: 80230ad0 80239bb0 80000113 ffffffff r5:80000113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eb291dc0 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:00000000 r9:850f5d80 r8:80287e08 r7:eb28de60 r6:850f5e00 r5:8533bc00 r4:8484cc40 task:kworker/0:82 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee479000 r5:8496778c r4:84967400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84761e80 1fa0: 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484cd00 r7:ddde2d80 r6:83018200 r5:853c5f8c r4:850f5d80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8484cc40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3313 blocked for more than 452 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:849c0000 r4:849c0000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c0000 r4:8291a680 [ <<cut 8518928 bytes out>> >] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8ce40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85924800 r7:00000000 r6:83018000 r5:00001000 r4:7f977000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee125000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dc878c r4:85dc8400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dc878c r4:85c94680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85924800 r8:85c946ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94680 r8:80287e08 r7:ee339e60 r6:85c94700 r5:85924800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e94400 INFO: task kworker/0:852:8145 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:8146 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:8146 tgid:8146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee341d84 r8:00000002 r7:60000013 r6:ee341d8c r5:85b60000 r4:85b60000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b60000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee341e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eacf80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b60000 r7:00000000 r6:83018000 r5:00001000 r4:7f97b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee145000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f6778c r4:85f67400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85f6778c r4:85c94580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b60000 r8:85c945ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94580 r8:80287e08 r7:ee33de60 r6:85c94600 r5:85b60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:853:8146 is blocked on a mutex likely owned by task kworker/0:12:3148. Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85b60c00 r7:00000000 r6:83018000 r5:00001000 r4:7f979000 r7:dddced80 r6:83018000 r5:85dcbb8c r4:85c94780 r10:00000000 r9:85c94780 r8:80287e08 r7:ee341e60 r6:85c94800 r5:85b60c00 INFO: task kworker/0:854:8148 is blocked on a mutex likely owned by task kworker/0:12:3148. dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r4:82ac21e4 r4:df9dddc0 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:855:8149 blocked for more than 471 seconds. r4:85b62400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee34de08 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee21f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dcb78c r4:85dcb400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dcb78c r4:85c94880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b62400 r8:85c948ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94880 r8:80287e08 r7:ee341e60 r6:85c94900 r5:85b62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee34dfb0 to 0xee34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab240 INFO: task kworker/0:855:8149 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:856:8155 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:856 state:D stack:0 pid:8155 tgid:8155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee35dd84 r8:00000002 r7:60000113 r6:ee35dd8c r5:85b63000 r4:85b63000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b63000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee35de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eab6c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b63000 r7:00000000 r6:83018000 r5:00001000 r4:7f983000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee183000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dca38c r4:85dca000 r7:dddced80 r6:83018000 r5:85dca38c r4:85c94980 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ee1f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dcaf8c r4:85dcac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dcaf8c r4:85c94a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d5bc00 r8:85c94aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94a80 r8:80287e08 r7:ee34de60 r6:85b1e300 r5:85d5bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee349fb0 to 0xee349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab780 INFO: task kworker/0:857:8156 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eabac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85d5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f987000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee20b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496078c r4:84960400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496078c r4:85c94b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d5d400 r8:85c94b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94b00 r8:80287e08 r7:ee34de60 r6:85b1e380 r5:85d5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee365fb0 to 0xee365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eab5c0 INFO: task kworker/0:858:8159 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dd478c r4:85c94b80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:860:8164 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:860 state:D stack:0 pid:8164 tgid:8164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee361d84 r8:00000002 r7:60000113 r6:ee361d8c r5:85b64800 r4:85b64800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b64800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee361e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85eabe80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b64800 r7:00000000 r6:83018000 r5:00001000 r4:7f98d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee295000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85dd4f8c r4:85dd4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b65400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee36de08 r4:00000000 r5:85dd538c r4:85dd5000 r10:61c88647 r9:85b65400 r8:85c94dac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:862 state:D stack:0 pid:8167 tgid:8167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee371d84 r8:00000002 r7:60000113 r6:ee371d8c r5:85b66000 r4:85b66000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b66000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee371e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8cfc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b66000 r7:00000000 r6:83018000 r5:00001000 r4:7f991000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd578c r4:85dd5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd578c r4:85c94e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b66000 r8:85c94eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94e80 r8:80287e08 r7:ee36de60 r6:85c94f00 r5:85b66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee371fb0 to 0xee371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eabcc0 INFO: task kworker/0:862:8167 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f993000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:82ac21e4 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e94400 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b61800 r7:00000000 r6:83018000 r5:00001000 r4:7f995000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2cf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dd4b8c r4:85dd4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dd4b8c r4:85cec000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b61800 r8:85cec02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec000 r8:80287e08 r7:ee375e60 r6:85cec080 r5:85b61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee379fb0 to 0xee379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85eabcc0 INFO: task kworker/0:864:8171 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:865:8173 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:8173 tgid:8173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee37dd84 r8:00000002 r7:60000113 r6:ee37dd8c r5:84918000 r4:84918000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84918000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee37de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855280c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84918000 r7:00000000 r6:83018000 r5:00001000 r4:7f997000 r5:85dd638c r4:85dd6000 r7:dddced80 r6:83018000 r5:85dd638c r4:85cec100 r10:00000000 r9:85cec100 r8:80287e08 r7:ee379e60 r6:85cec180 r5:84918000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:866:8175 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:866 state:D stack:0 pid:8175 tgid:8175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee381d84 r8:00000002 r7:60000113 r6:ee381d8c r5:84918c00 r4:84918c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84918c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee381e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84918c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb65000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee73b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dddf8c r4:85dddc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dddf8c r4:85cec200 r10:61c88647 r9:84918c00 r8:85cec22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85d5c800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dd678c r4:85dd6400 r10:61c88647 r9:85d5c800 r8:85cec32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85d5b000 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dd5f8c r4:85dd5c00 r10:61c88647 r9:85d5b000 r8:85cec3ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:8184 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:8184 tgid:8184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee351d84 r8:00000002 r7:60000013 r6:ee351d8c r5:85d5a400 r4:85d5a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d5a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee351e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e747c0 r5:85ddc78c r4:85ddc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:8456 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85d5e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee88de08 r9:83018005 r8:85d5e000 r7:00000000 r6:83018000 r5:00001000 r4:7fb5b000 r5:85ddcf8c r4:85ddcc00 r10:61c88647 r9:85d5e000 r8:85cec4ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85d58000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85cec500 r8:80287e08 r7:ee381e60 r6:859fd380 r5:85d58000 r4:85e74680 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee891d84 r8:00000002 r7:60000013 r6:ee891d8c r5:8491d400 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ddcb8c r4:85ddc800 r7:dddced80 r6:83018000 r5:85ddcb8c r4:85cec580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491d400 r8:85cec5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec580 r8:80287e08 r7:ee381e60 r6:85cec600 r5:8491d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee891fb0 to 0xee891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e74b00 INFO: task kworker/0:872:8461 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:873:8463 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:873 state:D stack:0 pid:8463 tgid:8463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee875d84 r8:00000002 r7:60000013 r6:ee875d8c r5:85d5ec00 r4:85d5ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d5ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee875e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e74cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85d5ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb63000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ddd78c r4:85ddd400 r10:61c88647 r9:85d5ec00 r8:85cec6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee8a1d84 r8:00000002 r7:60000013 r6:ee8a1d8c r5:85c06000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85dde38c r4:85dde000 r10:61c88647 r9:85c06000 r8:85cec72c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:875:8468 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:875 state:D stack:0 pid:8468 tgid:8468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8a9d84 r8:00000002 r7:60000113 r6:ee8a9d8c r5:85f00c00 r4:85f00c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f00c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8a9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f00c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb73000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddeb8c r4:85dde800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddeb8c r4:85cec780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f00c00 r8:85cec7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec780 r8:80287e08 r7:ee8a1e60 r6:859fd500 r5:85f00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8a9fb0 to 0xee8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8600f680 INFO: task kworker/0:875:8468 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 826d9000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:876:8469 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:8469 tgid:8469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8add84 r8:00000002 r7:60000113 r6:ee8add8c r5:85f01800 r4:85f01800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f01800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8ade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8600f900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f01800 r7:00000000 r6:83018000 r5:00001000 r4:7fb69000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee78f000 r5:85dde78c r4:85dde400 r7:dddced80 r6:83018000 r5:85dde78c r4:85cec800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:877:8471 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:877 state:D stack:0 pid:8471 tgid:8471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8b5d84 r8:00000002 r7:60000113 r6:ee8b5d8c r5:85f00000 r4:85f00000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f00000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8b5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84954b00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f00000 r7:00000000 r6:83018000 r5:00001000 r4:7fb6b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddc38c r4:85ddc000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddc38c r4:85cec880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f00000 r8:85cec8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cec880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cec880 r8:80287e08 r7:ee8a9e60 r6:859fd600 r5:85f00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8b5fb0 to 0xee8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e74f40 INFO: task kworker/0:877:8471 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8491c800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85ddef8c r4:85ddec00 r7:dddced80 r6:83018000 r5:85ddef8c r4:85cec900 r10:00000000 r9:85cec900 r8:80287e08 r7:ee8a9e60 r6:85cec980 r5:8491c800 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:8476 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:8476 tgid:8476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8bdd84 r8:00000002 r7:60000113 r6:ee8bdd8c r5:8491ec00 r4:8491ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8bde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8491ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb6f000 r7:dddced80 r6:83018000 r5:85dddb8c r4:85ceca00 r4:00000001 r4:85fb2280 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8491bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb71000 r10:61c88647 r9:8491bc00 r8:85cecb2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:82ac21e4 r4:00000000 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred r4:85f02400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f02400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8d1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb27c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f02400 r7:00000000 r6:83018000 r5:00001000 r4:7fb75000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7f3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddff8c r4:85ddfc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddff8c r4:85cecc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f02400 r8:85cecc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecc00 r8:80287e08 r7:ee8a9e60 r6:859fd680 r5:85f02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8d1fb0 to 0xee8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2080 INFO: task kworker/0:881:8480 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:8482 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85f03c00 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85ddfb8c r4:85cecc80 r10:61c88647 r9:85f03c00 r8:85ceccac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:8483 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:8483 tgid:8483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8c5d84 r8:00000002 r7:60000113 r6:ee8c5d8c r5:8491a400 r4:8491a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8c5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8491a400 r7:00000000 r6:83018000 r5:00001000 r4:7fb77000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8cd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8496538c r4:84965000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8496538c r4:85cecd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491a400 r8:85cecd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecd00 r8:80287e08 r7:ee8d9e60 r6:85cecd80 r5:8491a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8c5fb0 to 0xee8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb26c0 INFO: task kworker/0:883:8483 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:8486 blocked for more than 471 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ee8d5d84 r8:00000002 r7:60000113 r6:ee8d5d8c r5:8491e000 [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85cece00 r8:80287e08 r7:ee8d9e60 r6:85cece80 r5:8491e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8d5fb0 to 0xee8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb26c0 INFO: task kworker/0:884:8486 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:8487 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:8487 tgid:8487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee899d84 r8:00000002 r7:60000013 r6:ee899d8c r5:84919800 r4:84919800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84919800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee899e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb2dc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84919800 r7:00000000 r6:83018000 r5:00001000 r4:7fb7d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8f7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de4b8c r4:85de4800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de4b8c r4:85cecf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84919800 r8:85cecf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85cecf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85cecf00 r8:80287e08 r7:ee8d5e60 r6:85cecf80 r5:84919800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee899fb0 to 0xee899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2a80 INFO: task kworker/0:885:8487 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:8490 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:8490 tgid:8490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee8edd84 r8:00000002 r7:60000013 r6:ee8edd8c r5:8491b000 r4:8491b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8491b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8ede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8491b000 r7:00000000 r6:83018000 r5:00001000 r4:7fb81000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee90b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de578c r4:85de5400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de578c r4:85f98000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8491b000 r8:85f9802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98000 r8:80287e08 r7:ee899e60 r6:85f98080 r5:8491b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee8edfb0 to 0xee8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb2d80 INFO: task kworker/0:886:8490 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ee901d84 r8:00000002 r7:60000013 r6:ee901d8c r5:849d8000 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85de538c r4:85de5000 r10:61c88647 r9:849d8000 r8:85f9812c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:888:8494 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:888 state:D stack:0 pid:8494 tgid:8494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee909d84 r8:00000002 r7:60000113 r6:ee909d8c r5:849d8c00 r4:849d8c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849d8c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee909e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf2c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb83000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee911000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de5b8c r4:85de5800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de5b8c r4:85f98200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849d8c00 r8:85f9822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98200 r8:80287e08 r7:ee8ede60 r6:85f98280 r5:849d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee909fb0 to 0xee909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fbf200 INFO: task kworker/0:888:8494 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:8496 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ee915d84 r8:00000002 r7:60000113 r6:ee915d8c r5:849d9800 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849d9800 r8:85f9832c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:890:8498 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:890 state:D stack:0 pid:8498 tgid:8498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee91dd84 r8:00000002 r7:60000113 r6:ee91dd8c r5:849da400 r4:849da400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849da400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85de678c r4:85de6400 r7:dddced80 r6:83018000 r5:85de678c r4:85f98400 r10:00000000 r9:85f98400 r8:80287e08 r7:ee915e60 r6:85f98480 r5:849da400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ee8f5d84 r8:00000002 r7:60000113 r6:ee8f5d8c r5:849dbc00 r4:849dbc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849dbc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee8f5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fbf940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb43000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de6f8c r4:85de6c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de6f8c r4:85f98500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dbc00 r8:85f9852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98500 r8:80287e08 r7:ee91de60 r6:85f98580 r5:849dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849dc800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee929e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85de778c r4:85de7400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de778c r4:85f98600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849dc800 r8:85f9862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98600 r8:80287e08 r7:ee8f5e60 r6:85f98680 r5:849dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee929fb0 to 0xee929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fbf880 INFO: task kworker/0:892:8504 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:893:8505 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:893 state:D stack:0 pid:8505 tgid:8505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee935d84 r8:00000002 r7:60000113 r6:ee935d8c r5:849dd400 r4:849dd400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849dd400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee935e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r5:00001000 r4:ee4d9000 r5:8496278c r4:84962400 r10:61c88647 r9:849dd400 r8:85f9872c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:8544 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:894 state:D stack:0 pid:8544 tgid:8544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea1dd84 r8:00000002 r7:60000013 r6:eea1dd8c r5:849de000 r4:849de000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849de000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:85de6b8c r4:85de6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:895:8545 blocked for more than 471 seconds. r5:849dec00 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85de7f8c r4:85de7c00 r10:61c88647 r9:849dec00 r8:85f9892c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9ddd28 to 0xdf9ddd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:849db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee879e08 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:849db000 r7:00000000 r6:83018000 r5:00001000 r4:7fb55000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee607000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de738c r4:85de7000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de738c r4:85f98a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849db000 r8:85f98a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98a00 r8:80287e08 r7:ee935e60 r6:85f98a80 r5:849db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee879fb0 to 0xee879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529f100 INFO: task kworker/0:896:8548 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:8550 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:8550 tgid:8550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee881d84 r8:00000002 r7:60000113 r6:ee881d8c r5:84b68000 r4:84b68000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee881e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f5c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b68000 r7:00000000 r6:83018000 r5:00001000 r4:7fb59000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee639000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85decb8c r4:85dec800 r7:dddced80 r6:83018000 r5:85decb8c r4:85f98b00 r10:00000000 r9:85f98b00 r8:80287e08 r7:ee879e60 r6:85f98b80 r5:84b68000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) r4:df9dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84b68c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee885e08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dec38c r4:85f98c00 Exception stack(0xee885fb0 to 0xee885ff8) task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84b69800 r4:8291a680 [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85f98d00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85ded78c r4:85ded400 r7:dddced80 r6:83018000 r5:85ded78c r4:85f98e00 r10:00000000 r9:85f98e00 r8:80287e08 r7:ee8dde60 r6:85f98e80 r5:84b6a400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:8558 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:8558 tgid:8558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea25d84 r8:00000002 r7:60000113 r6:eea25d8c r5:84b6b000 r4:84b6b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fdc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b6b000 r7:00000000 r6:83018000 r5:00001000 r4:7fb65000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dedf8c r4:85dedc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dedf8c r4:85f98f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6b000 r8:85f98f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85f98f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85f98f00 r8:80287e08 r7:eea21e60 r6:85f98f80 r5:84b6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea25fb0 to 0xeea25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529f500 INFO: task kworker/0:901:8558 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) INFO: task kworker/0:902:8560 blocked for more than 471 seconds. r4:84b6c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee87de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529fa40 INFO: task kworker/0:902:8560 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:903:8561 blocked for more than 471 seconds. r4:84b6d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea2de08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85dec78c r4:85b36100 r10:00000000 r9:85b36100 r8:80287e08 r7:eea25e60 r6:85b36180 r5:84b6d400 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dffe3000 r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b6e000 r7:00000000 r6:83018000 r5:00001000 r4:7fb6b000 r7:dddced80 r6:83018000 r5:85def38c r4:85b36200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:8566 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:8566 tgid:8566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea35d84 r8:00000002 r7:60000013 r6:eea35d8c r5:84b6ec00 r4:84b6ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ff80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:84b6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fb67000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee7cb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85dee78c r4:85dee400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85dee78c r4:85b36300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6ec00 r8:85b3632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36300 r8:80287e08 r7:eea29e60 r6:85b36380 r5:84b6ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea35fb0 to 0xeea35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c000 INFO: task kworker/0:905:8566 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 r4:8334b7c0 Workqueue: events bpf_prog_free_deferred [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85b36400 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c580 INFO: task kworker/0:906:8569 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc5-syzkaller #0 r10:8291a684 r9:eea31d84 r8:00000002 r7:60000013 r6:eea31d8c r5:85018000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea31e08 r4:00000000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85defb8c r4:85def800 r10:61c88647 r9:85018000 r8:85b3652c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:8573 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:8573 tgid:8573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea45d84 r8:00000002 r7:60000113 r6:eea45d8c r5:85018c00 r4:85018c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea45e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1c700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb6f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee89d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85deff8c r4:85defc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85deff8c r4:85b36600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:85b3662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36600 r8:80287e08 r7:eea31e60 r6:85b36680 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea45fb0 to 0xeea45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c440 INFO: task kworker/0:908:8573 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r4:00000000 r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:909:8575 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eea49d84 r8:00000002 r7:60000013 r6:eea49d8c r5:85019800 r4:85019800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea49e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1c880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85019800 r7:00000000 r6:83018000 r5:00001000 r4:7fb71000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8af000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85decf8c r4:85decc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85decf8c r4:85b36700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:85b3672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36700 r8:80287e08 r7:eea45e60 r6:85b36780 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea49fb0 to 0xeea49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c540 INFO: task kworker/0:909:8575 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r5:8529a38c r4:8529a000 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8501b000 r4:8291a680 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85def78c r4:85def400 r10:61c88647 r9:8501b000 r8:85b3682c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80090113 ffffffff r4:00000000 [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8501bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1cf80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fb7b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85de7b8c r4:85de7800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85de7b8c r4:85b36900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501bc00 r8:85b3692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36900 r8:80287e08 r7:eea41e60 r6:85b36980 r5:8501bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea51fb0 to 0xeea51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c940 INFO: task kworker/0:911:8578 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:8580 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:8580 tgid:8580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea59d84 r8:00000002 r7:60000013 r6:eea59d8c r5:8501d400 r4:8501d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8501d400 r8:85b36a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85b36a00 r8:80287e08 r7:eea51e60 r6:85b36a80 r5:8501d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85b1cbc0 INFO: task kworker/0:912:8580 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:8582 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:8582 tgid:8582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea4dd84 r8:00000002 r7:60000113 r6:eea4dd8c r5:85f03000 r4:85f03000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f03000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1ce80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f03000 r7:00000000 r6:83018000 r5:00001000 r4:7fb79000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee8f1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ddf38c r4:85ddf000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ddf38c r4:85b36b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f03000 r8:85b36b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36b00 r8:80287e08 r7:eea51e60 r6:859fd780 r5:85f03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea4dfb0 to 0xeea4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cb00 INFO: task kworker/0:913:8582 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:8585 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:8585 tgid:8585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea65d84 r8:00000002 r7:60000013 r6:eea65d8c r5:85f05400 r4:85f05400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f05400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f05400 r7:00000000 r6:83018000 r5:00001000 r4:7fb7d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee90f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605038c r4:86050000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605038c r4:85b36b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f05400 r8:85b36bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36b80 r8:80287e08 r7:eea51e60 r6:859fd800 r5:85f05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea65fb0 to 0xeea65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cd00 INFO: task kworker/0:914:8585 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:8587 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:8587 tgid:8587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea6dd84 r8:00000002 r7:60000113 r6:eea6dd8c r5:85f06c00 r4:85f06c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f06c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6440 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f06c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb85000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea89000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86051b8c r4:86051800 r7:dddced80 r6:83018000 r5:86051b8c r4:85b36d80 r4:85b36d80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8529fb00 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd60: 80230ad0 80239bb0 80090113 ffffffff r4:df9dddc0 r4:00000000 r5:00001000 r4:dffe3000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:8588 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:8588 tgid:8588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea71d84 r8:00000002 r7:60000113 r6:eea71d8c r5:85f04800 r4:85f04800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f04800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea71e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fd80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f04800 r7:00000000 r6:83018000 r5:00001000 r4:7fb7f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee921000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86050b8c r4:86050800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86050b8c r4:85b36c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f04800 r8:85b36c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36c00 r8:80287e08 r7:eea6de60 r6:859fd900 r5:85f04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea71fb0 to 0xeea71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8529fb00 INFO: task kworker/0:916:8588 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:df9dddc0 r5:00001000 r4:dffe3000 r4:849f1580 Exception stack(0xdf9ddfb0 to 0xdf9ddff8) Not tainted 6.15.0-rc5-syzkaller #0 r4:85f06000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea7de08 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f06000 r7:00000000 r6:83018000 r5:00001000 r4:7fb81000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee92d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605138c r4:86051000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605138c r4:85b36e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f06000 r8:85b36eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36e80 r8:80287e08 r7:eea6de60 r6:859fd980 r5:85f06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea7dfb0 to 0xeea7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6040 INFO: task kworker/0:917:8590 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 r4:00000000 r5:8529a38c r4:8529a000 r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8334b7c0 r4:85c2bc00 r5:85c2bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea8dfb0 to 0xeea8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc60c0 INFO: task kworker/0:918:8592 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:8594 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:8594 tgid:8594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea99d84 r8:00000002 r7:60000013 r6:eea99d8c r5:85f08c00 r4:85f08c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f08c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f08c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbdd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeae3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86052f8c r4:86052c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86052f8c r4:85b36d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f08c00 r8:85b36d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36d00 r8:80287e08 r7:eea6de60 r6:859fda80 r5:85f08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea99fb0 to 0xeea99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6040 INFO: task kworker/0:919:8594 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:8596 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:8596 tgid:8596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeaa1d84 r8:00000002 r7:60000013 r6:eeaa1d8c r5:85f08000 r4:85f08000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f08000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeaa1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6200 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f08000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaa9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605078c r4:86050400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605078c r4:85b36e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f08000 r8:85b36e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36e00 r8:80287e08 r7:eea99e60 r6:859fdb00 r5:85f08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeaa1fb0 to 0xeeaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc60c0 INFO: task kworker/0:920:8596 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:8599 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:8599 tgid:8599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeabdd84 r8:00000002 r7:60000113 r6:eeabdd8c r5:85f0a400 r4:85f0a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeabde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6680 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0a400 r7:00000000 r6:83018000 r5:00001000 r4:7fbd5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeab3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605238c r4:86052000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605238c r4:85b36f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0a400 r8:85b36f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36f00 r8:80287e08 r7:eea99e60 r6:859fdb80 r5:85f0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeabdfb0 to 0xeeabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6780 INFO: task kworker/0:921:8599 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:8601 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:8601 tgid:8601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeac5d84 r8:00000002 r7:60000113 r6:eeac5d8c r5:85f0bc00 r4:85f0bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeac5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fbd7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeab9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86050f8c r4:86050c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86050f8c r4:85b36f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0bc00 r8:85b36fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b36f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b36f80 r8:80287e08 r7:eea99e60 r6:859fdc00 r5:85f0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeac5fb0 to 0xeeac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6740 INFO: task kworker/0:922:8601 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:8603 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:8603 tgid:8603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eead9d84 r8:00000002 r7:60000013 r6:eead9d8c r5:85f0b000 r4:85f0b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eead9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6940 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0b000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeacf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86052b8c r4:86052800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86052b8c r4:85fbc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0b000 r8:85fbc02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc000 r8:80287e08 r7:eea99e60 r6:859fdc80 r5:85f0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeead9fb0 to 0xeead9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6640 INFO: task kworker/0:923:8603 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:8605 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:8605 tgid:8605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeae1d84 r8:00000002 r7:60000013 r6:eeae1d8c r5:85f0c800 r4:85f0c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeae1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6a00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0c800 r7:00000000 r6:83018000 r5:00001000 r4:7fbdb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eead5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605278c r4:86052400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605278c r4:85fbc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0c800 r8:85fbc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc080 r8:80287e08 r7:eea99e60 r6:859fdd00 r5:85f0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeae1fb0 to 0xeeae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc64c0 INFO: task kworker/0:924:8605 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:8608 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:8608 tgid:8608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeaedd84 r8:00000002 r7:60000013 r6:eeaedd8c r5:85f0d400 r4:85f0d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeaede08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6ec0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0d400 r7:00000000 r6:83018000 r5:00001000 r4:7fbe1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaf3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86053b8c r4:86053800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86053b8c r4:85fbc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0d400 r8:85fbc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc100 r8:80287e08 r7:eea99e60 r6:859fdd80 r5:85f0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeaedfb0 to 0xeeaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6880 INFO: task kworker/0:925:8608 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:8610 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:8610 tgid:8610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeafdd84 r8:00000002 r7:60000013 r6:eeafdd8c r5:85f0e000 r4:85f0e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeafde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6cc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0e000 r7:00000000 r6:83018000 r5:00001000 r4:7fbdf000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeae9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605338c r4:86053000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605338c r4:85fbc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0e000 r8:85fbc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc180 r8:80287e08 r7:eeaede60 r6:859fde00 r5:85f0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeafdfb0 to 0xeeafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6a80 INFO: task kworker/0:926:8610 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:8611 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:8611 tgid:8611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb01d84 r8:00000002 r7:60000013 r6:eeb01d8c r5:85f0ec00 r4:85f0ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f0ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb01e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fc6d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7fbe3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaf9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86051f8c r4:86051c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86051f8c r4:85fbc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f0ec00 r8:85fbc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc200 r8:80287e08 r7:eeaede60 r6:859fde80 r5:85f0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb01fb0 to 0xeeb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6e80 INFO: task kworker/0:927:8611 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:8614 blocked for more than 471 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:8614 tgid:8614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb0dd84 r8:00000002 r7:60000113 r6:eeb0dd8c r5:854d6000 r4:854d6000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854d6000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:854d6000 r7:00000000 r6:83018000 r5:00001000 r4:7fb21000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee393000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605838c r4:86058000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605838c r4:85fbc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854d6000 r8:85fbc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc280 r8:80287e08 r7:eeb01e60 r6:859fdf00 r5:854d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb0dfb0 to 0xeeb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fc6e80 INFO: task kworker/0:928:8614 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:8615 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:8615 tgid:8615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeacdd84 r8:00000002 r7:60000113 r6:eeacdd8c r5:8501e000 r4:8501e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeacde08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85f99740 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501e000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb0f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85deeb8c r4:85dee800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85deeb8c r4:85fbc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501e000 r8:85fbc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc300 r8:80287e08 r7:eeb0de60 r6:85fbc380 r5:8501e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeacdfb0 to 0xeeacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85f99f80 INFO: task kworker/0:929:8615 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:8618 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:8618 tgid:8618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb09d84 r8:00000002 r7:60000113 r6:eeb09d8c r5:8501ec00 r4:8501ec00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501ec00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb09e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838d80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df877000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605378c r4:86053400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605378c r4:85fbc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501ec00 r8:85fbc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc400 r8:80287e08 r7:eeb0de60 r6:85fbc480 r5:8501ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb09fb0 to 0xeeb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c240 INFO: task kworker/0:930:8618 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:8619 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:8619 tgid:8619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eea5dd84 r8:00000002 r7:60000113 r6:eea5dd8c r5:8501c800 r4:8501c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eea5de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7340 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7fb43000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4a1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86058b8c r4:86058800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86058b8c r4:85fbc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:85fbc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc500 r8:80287e08 r7:eeb0de60 r6:85fbc580 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeea5dfb0 to 0xeea5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85f99f80 INFO: task kworker/0:931:8619 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:8621 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:8621 tgid:8621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb21d84 r8:00000002 r7:60000113 r6:eeb21d8c r5:85b70000 r4:85b70000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb21e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7100 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b70000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee695000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86058f8c r4:86058c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86058f8c r4:85fbc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70000 r8:85fbc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc600 r8:80287e08 r7:eea5de60 r6:85fbc680 r5:85b70000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb21fb0 to 0xeeb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7100 INFO: task kworker/0:932:8621 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:8624 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:8624 tgid:8624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb1dd84 r8:00000002 r7:60000113 r6:eeb1dd8c r5:85b71800 r4:85b71800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b71800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb1de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7d40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b71800 r7:00000000 r6:83018000 r5:00001000 r4:7fbf1000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee70b000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605a38c r4:8605a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605a38c r4:85fbc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b71800 r8:85fbc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc700 r8:80287e08 r7:eeb21e60 r6:85fbc780 r5:85b71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb1dfb0 to 0xeeb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7300 INFO: task kworker/0:933:8624 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:8626 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:8626 tgid:8626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb29d84 r8:00000002 r7:60000013 r6:eeb29d8c r5:85b73000 r4:85b73000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b73000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb29e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7600 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b73000 r7:00000000 r6:83018000 r5:00001000 r4:7fbe9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6b3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605978c r4:86059400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605978c r4:85fbc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b73000 r8:85fbc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc800 r8:80287e08 r7:eeb1de60 r6:85fbc880 r5:85b73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb29fb0 to 0xeeb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa75c0 INFO: task kworker/0:934:8626 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:8627 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:8627 tgid:8627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb2dd84 r8:00000002 r7:60000013 r6:eeb2dd8c r5:85b74800 r4:85b74800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b74800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb2de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b74800 r7:00000000 r6:83018000 r5:00001000 r4:7fbeb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6d3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86059b8c r4:86059800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86059b8c r4:85fbc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b74800 r8:85fbc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbc900 r8:80287e08 r7:eeb1de60 r6:85fbc980 r5:85b74800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb2dfb0 to 0xeeb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7840 INFO: task kworker/0:935:8627 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:8630 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:8630 tgid:8630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb35d84 r8:00000002 r7:60000013 r6:eeb35d8c r5:85b73c00 r4:85b73c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b73c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb35e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7b40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b73c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbef000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee6f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:86059f8c r4:86059c00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:86059f8c r4:85fbca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b73c00 r8:85fbca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbca00 r8:80287e08 r7:eeb1de60 r6:85fbca80 r5:85b73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb35fb0 to 0xeeb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa75c0 INFO: task kworker/0:936:8630 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:8634 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:8634 tgid:8634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb31d84 r8:00000002 r7:60000113 r6:eeb31d8c r5:85b72400 r4:85b72400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b72400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb31e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa7f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b72400 r7:00000000 r6:83018000 r5:00001000 r4:7fbf3000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee723000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ab8c r4:8605a800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ab8c r4:85fbcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b72400 r8:85fbcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcb00 r8:80287e08 r7:eeb1de60 r6:85fbcb80 r5:85b72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb31fb0 to 0xeeb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7b00 INFO: task kworker/0:937:8634 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:8635 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:8635 tgid:8635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb39d84 r8:00000002 r7:60000113 r6:eeb39d8c r5:85b76000 r4:85b76000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b76000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb39e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b76000 r7:00000000 r6:83018000 r5:00001000 r4:7fbf5000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee739000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605b38c r4:8605b000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605b38c r4:85fbcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b76000 r8:85fbcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcc00 r8:80287e08 r7:eeb31e60 r6:85fbcc80 r5:85b76000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb39fb0 to 0xeeb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:938:8635 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:8638 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:8638 tgid:8638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb25d84 r8:00000002 r7:60000113 r6:eeb25d8c r5:85b76c00 r4:85b76c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b76c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb25e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4540 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b76c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbfb000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee859000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605878c r4:86058400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605878c r4:85fbcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b76c00 r8:85fbcd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcd00 r8:80287e08 r7:eeb39e60 r6:85fbcd80 r5:85b76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb25fb0 to 0xeeb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:939:8638 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:8640 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:8640 tgid:8640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb41d84 r8:00000002 r7:60000113 r6:eeb41d8c r5:85b70c00 r4:85b70c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b70c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb41e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb42c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85b70c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbf9000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee849000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605a78c r4:8605a400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605a78c r4:85fbce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b70c00 r8:85fbce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbce00 r8:80287e08 r7:eeb25e60 r6:85fbce80 r5:85b70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb41fb0 to 0xeeb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4280 INFO: task kworker/0:940:8640 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:941:8643 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:941 state:D stack:0 pid:8643 tgid:8643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb4dd84 r8:00000002 r7:60000113 r6:eeb4dd8c r5:85f13c00 r4:85f13c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f13c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb4de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f13c00 r7:00000000 r6:83018000 r5:00001000 r4:7fbfd000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee86d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605bb8c r4:8605b800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605bb8c r4:85c94f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f13c00 r8:85c94fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c94f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c94f80 r8:80287e08 r7:eeb25e60 r6:859fdf80 r5:85f13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb4dfb0 to 0xeeb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb46c0 INFO: task kworker/0:941:8643 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:8645 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:8645 tgid:8645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb51d84 r8:00000002 r7:60000013 r6:eeb51d8c r5:85f11800 r4:85f11800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f11800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb51e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4a80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f11800 r7:00000000 r6:83018000 r5:00001000 r4:7fc03000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee99f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605af8c r4:8605ac00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605af8c r4:85fbcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f11800 r8:85fbcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcf00 r8:80287e08 r7:eeb4de60 r6:859fd180 r5:85f11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb51fb0 to 0xeeb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4600 INFO: task kworker/0:942:8645 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 82e9f000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:943:8646 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:943 state:D stack:0 pid:8646 tgid:8646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb55d84 r8:00000002 r7:60000013 r6:eeb55d8c r5:85f14800 r4:85f14800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f14800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb55e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4900 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f14800 r7:00000000 r6:83018000 r5:00001000 r4:7fbff000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee981000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605938c r4:86059000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605938c r4:85fbcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f14800 r8:85fbcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85fbcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85fbcf80 r8:80287e08 r7:eeb51e60 r6:859fd200 r5:85f14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb55fb0 to 0xeeb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb47c0 INFO: task kworker/0:943:8646 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:944:8648 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:944 state:D stack:0 pid:8648 tgid:8648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb59d84 r8:00000002 r7:60000013 r6:eeb59d8c r5:85f15400 r4:85f15400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f15400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb59e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4640 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f15400 r7:00000000 r6:83018000 r5:00001000 r4:7fc01000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee98d000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605b78c r4:8605b400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605b78c r4:85e7d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f15400 r8:85e7d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d000 r8:80287e08 r7:eeb51e60 r6:859fd280 r5:85f15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb59fb0 to 0xeeb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4340 INFO: task kworker/0:944:8648 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:8651 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:8651 tgid:8651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb65d84 r8:00000002 r7:60000113 r6:eeb65d8c r5:85f12400 r4:85f12400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f12400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb65e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4c40 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f12400 r7:00000000 r6:83018000 r5:00001000 r4:7fc05000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9ab000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605c38c r4:8605c000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605c38c r4:85e7d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f12400 r8:85e7d0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d080 r8:80287e08 r7:eeb51e60 r6:859fd080 r5:85f12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb65fb0 to 0xeeb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4340 INFO: task kworker/0:945:8651 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:946:8652 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:946 state:D stack:0 pid:8652 tgid:8652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb69d84 r8:00000002 r7:60000013 r6:eeb69d8c r5:85f13000 r4:85f13000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f13000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb69e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4f00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f13000 r7:00000000 r6:83018000 r5:00001000 r4:7fc0d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9e7000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605db8c r4:8605d800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605db8c r4:85e7d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f13000 r8:85e7d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d100 r8:80287e08 r7:eeb65e60 r6:859fd100 r5:85f13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb69fb0 to 0xeeb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4080 INFO: task kworker/0:946:8652 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:8653 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:8653 tgid:8653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb6dd84 r8:00000002 r7:60000113 r6:eeb6dd8c r5:85f16000 r4:85f16000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f16000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb6de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4e00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f16000 r7:00000000 r6:83018000 r5:00001000 r4:7fc07000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9bd000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605cb8c r4:8605c800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605cb8c r4:85e7d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f16000 r8:85e7d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d180 r8:80287e08 r7:eeb69e60 r6:85e81000 r5:85f16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb6dfb0 to 0xeeb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4f00 INFO: task kworker/0:947:8653 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:948:8655 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:948 state:D stack:0 pid:8655 tgid:8655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb75d84 r8:00000002 r7:60000013 r6:eeb75d8c r5:85f16c00 r4:85f16c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f16c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb75e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4e80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f16c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc09000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9c9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605d38c r4:8605d000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605d38c r4:85e7d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f16c00 r8:85e7d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d200 r8:80287e08 r7:eeb69e60 r6:85e81080 r5:85f16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb75fb0 to 0xeeb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fb4b40 INFO: task kworker/0:948:8655 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:8657 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:8657 tgid:8657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb7dd84 r8:00000002 r7:60000013 r6:eeb7dd8c r5:85f09800 r4:85f09800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f09800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb7de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e54c00 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f09800 r7:00000000 r6:83018000 r5:00001000 r4:7fc0b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9db000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605d78c r4:8605d400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605d78c r4:85e7d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f09800 r8:85e7d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d280 r8:80287e08 r7:eeb69e60 r6:85e81100 r5:85f09800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb7dfb0 to 0xeeb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54800 INFO: task kworker/0:949:8657 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:8661 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:8661 tgid:8661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb8dd84 r8:00000002 r7:60000113 r6:eeb8dd8c r5:86089800 r4:86089800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86089800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb8de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa70c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86089800 r7:00000000 r6:83018000 r5:00001000 r4:7fc0f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee9f9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605df8c r4:8605dc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605df8c r4:85e7d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86089800 r8:85e7d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d300 r8:80287e08 r7:eeb69e60 r6:85e81180 r5:86089800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb8dfb0 to 0xeeb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85fa7440 INFO: task kworker/0:950:8661 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:8663 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:8663 tgid:8663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb95d84 r8:00000002 r7:60000113 r6:eeb95d8c r5:86088000 r4:86088000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86088000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb95e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fb4fc0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86088000 r7:00000000 r6:83018000 r5:00001000 r4:7fc11000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea05000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605e78c r4:8605e400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605e78c r4:85e7d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86088000 r8:85e7d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d380 r8:80287e08 r7:eeb8de60 r6:85e81200 r5:86088000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb95fb0 to 0xeeb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54c80 INFO: task kworker/0:951:8663 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:8664 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:8664 tgid:8664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eeb99d84 r8:00000002 r7:60000113 r6:eeb99d8c r5:86088c00 r4:86088c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86088c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eeb99e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85fa75c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86088c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc13000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eea17000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605c78c r4:8605c400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605c78c r4:85e7d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86088c00 r8:85e7d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d400 r8:80287e08 r7:eeb95e60 r6:85e81280 r5:86088c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeeb99fb0 to 0xeeb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e54c80 INFO: task kworker/0:952:8664 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:8667 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:8667 tgid:8667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebadd84 r8:00000002 r7:60000113 r6:eebadd8c r5:8608c800 r4:8608c800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608c800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebade08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45880 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608c800 r7:00000000 r6:83018000 r5:00001000 r4:7fc21000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebf3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605cf8c r4:8605cc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605cf8c r4:85e7d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608c800 r8:85e7d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d480 r8:80287e08 r7:eeb99e60 r6:85e81300 r5:8608c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebadfb0 to 0xeebadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:953:8667 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:954:8668 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:954 state:D stack:0 pid:8668 tgid:8668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebb1d84 r8:00000002 r7:60000113 r6:eebb1d8c r5:8608d400 r4:8608d400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608d400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebb1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45000 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608d400 r7:00000000 r6:83018000 r5:00001000 r4:7fc15000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb9f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605eb8c r4:8605e800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605eb8c r4:85e7d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608d400 r8:85e7d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d500 r8:80287e08 r7:eebade60 r6:85e81380 r5:8608d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebb1fb0 to 0xeebb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:954:8668 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:8669 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:8669 tgid:8669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebb9d84 r8:00000002 r7:60000113 r6:eebb9d8c r5:8608b000 r4:8608b000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608b000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebb9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608b000 r7:00000000 r6:83018000 r5:00001000 r4:7fc17000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeba5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ef8c r4:8605ec00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ef8c r4:85e7d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608b000 r8:85e7d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d580 r8:80287e08 r7:eebade60 r6:85e81400 r5:8608b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebb9fb0 to 0xeebb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45080 INFO: task kworker/0:955:8669 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:956:8671 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:956 state:D stack:0 pid:8671 tgid:8671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebc9d84 r8:00000002 r7:60000113 r6:eebc9d8c r5:8608e000 r4:8608e000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608e000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebc9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45480 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608e000 r7:00000000 r6:83018000 r5:00001000 r4:7fc19000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebbf000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605f38c r4:8605f000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605f38c r4:85e7d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608e000 r8:85e7d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d780 r8:80287e08 r7:eebade60 r6:85e81480 r5:8608e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebc9fb0 to 0xeebc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e450c0 INFO: task kworker/0:956:8671 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:8673 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:8673 tgid:8673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebd5d84 r8:00000002 r7:60000113 r6:eebd5d8c r5:8608bc00 r4:8608bc00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608bc00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebd5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e455c0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608bc00 r7:00000000 r6:83018000 r5:00001000 r4:7fc1b000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebc5000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605f78c r4:8605f400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605f78c r4:85e7d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608bc00 r8:85e7d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d600 r8:80287e08 r7:eebade60 r6:85e81500 r5:8608bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebd5fb0 to 0xeebd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e456c0 INFO: task kworker/0:957:8673 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:8676 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:8676 tgid:8676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebe9d84 r8:00000002 r7:60000113 r6:eebe9d8c r5:85f10c00 r4:85f10c00 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85f10c00 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebe9e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45700 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:85f10c00 r7:00000000 r6:83018000 r5:00001000 r4:7fc1d000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebdb000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605fb8c r4:8605f800 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605fb8c r4:85e7d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85f10c00 r8:85e7d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d680 r8:80287e08 r7:eebade60 r6:85e81580 r5:85f10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebe9fb0 to 0xeebe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45680 INFO: task kworker/0:958:8676 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:8677 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:8677 tgid:8677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebf1d84 r8:00000002 r7:60000013 r6:eebf1d8c r5:8608a400 r4:8608a400 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8608a400 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebf1e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45300 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:8608a400 r7:00000000 r6:83018000 r5:00001000 r4:7fc1f000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebe1000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605ff8c r4:8605fc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605ff8c r4:85e7d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8608a400 r8:85e7d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d700 r8:80287e08 r7:eebade60 r6:85e81600 r5:8608a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebf1fb0 to 0xeebf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e457c0 INFO: task kworker/0:959:8677 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:8680 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:8680 tgid:8680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eec05d84 r8:00000002 r7:60000113 r6:eec05d8c r5:86090000 r4:86090000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86090000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eec05e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45c80 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86090000 r7:00000000 r6:83018000 r5:00001000 r4:7fc25000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eec0f000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8606038c r4:86060000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8606038c r4:85e7d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86090000 r8:85e7d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d800 r8:80287e08 r7:eebade60 r6:85e81680 r5:86090000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeec05fb0 to 0xeec05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45840 INFO: task kworker/0:960:8680 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:8682 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:8682 tgid:8682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eec0dd84 r8:00000002 r7:60000113 r6:eec0dd8c r5:86091800 r4:86091800 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86091800 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eec0de08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e45ac0 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86091800 r7:00000000 r6:83018000 r5:00001000 r4:7fc23000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eebf9000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8605bf8c r4:8605bc00 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8605bf8c r4:85e7d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86091800 r8:85e7d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d880 r8:80287e08 r7:eec05e60 r6:85e81700 r5:86091800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeec0dfb0 to 0xeec0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e459c0 INFO: task kworker/0:961:8682 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:963:8690 blocked for more than 472 seconds. Not tainted 6.15.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:963 state:D stack:0 pid:8690 tgid:8690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53b28>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52ba4>] (__schedule) from [<81a53b28>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eebe5d84 r8:00000002 r7:60000113 r6:eebe5d8c r5:86093000 r4:86093000 [<81a53afc>] (schedule) from [<81a53f10>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:86093000 r4:8291a680 [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53ef8>] (schedule_preempt_disabled) from [<81a565f4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a562f4>] (__mutex_lock.constprop.0) from [<81a56ac0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eebe5e08 r4:00000000 [<81a56aac>] (__mutex_lock_slowpath) from [<81a56b00>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56ac4>] (mutex_lock) from [<804e77b8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e47280 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:86093000 r7:00000000 r6:83018000 r5:00001000 r4:7fbd7000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeb11000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8606078c r4:86060400 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8606078c r4:85e7d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:86093000 r8:85e7d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85e7d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85e7d980 r8:80287e08 r7:eec19e60 r6:85e81800 r5:86093000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeebe5fb0 to 0xeebe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e45d00 INFO: task kworker/0:963:8690 is blocked on a mutex likely owned by task kworker/0:12:3148. task:kworker/0:12 state:R running task stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52ba4>] (__schedule) from [<81a53f5c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:83b2b000 r8:80200be4 r7:df9ddd5c r6:ffffffff r5:83b2b000 r4:00000000 [<81a53f1c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9ddd28 to 0xdf9ddd70) dd20: 8364e000 eafbd000 00000001 80239b98 7f43b000 00000001 dd40: 82ac15a0 7f43b000 eafbd000 8280c928 82ac21c4 df9ddda4 df9ddda8 df9ddd78 dd60: 80230ad0 80239bb0 80090113 ffffffff r5:80090113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e758c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e737c>] (__purge_vmap_area_lazy) from [<804e7934>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9dddc0 r5:df9dde08 r4:df9dddc0 [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7750>] (_vm_unmap_aliases) from [<804eb698>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a17040 r4:00000000 [<804eb530>] (vfree) from [<8054b10c>] (execmem_free+0x30/0x50 mm/execmem.c:397) r9:83018005 r8:83b2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0dc>] (execmem_free) from [<803cc22c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc21c>] (bpf_jit_free_exec) from [<803cc60c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5a4>] (bpf_jit_free) from [<803cd768>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd61c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:849f1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2b000 r8:849f15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849f1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f1580 r8:80287e08 r7:dfa3de60 r6:849f1600 r5:83b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000d0013 r5:600d0093 r4:82257d0c [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220048>] (dump_stack) from [<81a3cd0c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3cbac>] (nmi_cpu_backtrace) from [<81a3ce58>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3cd28>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:00019892 r8:82ab6564 r7:8280c788 r6:0000777c r5:8281b4c8 r4:86075d0c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386db4>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<8038690c>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8038690c r7:83348780 r6:83348780 r5:83251800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b500 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5bf2c>] lr : [<80a6292c>] psr: 60090113 sp : ebc39eb0 ip : ebc39ec0 fp : ebc39ebc r10: 8295b3bc r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000ec3b r2 : 00000000 r1 : 60090113 r0 : 8440a840 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 846a5640 DAC: fffffffd Call trace: [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5bf04>] (_raw_spin_unlock_irqrestore) from [<80a6292c>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6290c>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:83a63000 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:8454b280 r6:8454b280 r5:83a63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84070d00