Extracting prog: 11m55.453743453s Minimizing prog: 1h16m52.680261522s Simplifying prog options: 0s Extracting C: 8m56.968456533s Simplifying C: 55m9.781494899s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h32m54.884002227s repro crashed as (corrupted=false): INFO: task kworker/1:1:88 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:88 tgid:88 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:83b54800 r4:83b54800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b54800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d200 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df965000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff078c r4:84ff0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ff078c r4:8394b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b54800 r8:8394b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8394b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8394b680 r8:80287e08 r7:df879e60 r6:8394b700 r5:83b54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8394ea00 INFO: task kworker/1:1:88 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:2:3111 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b50c00 r4:83b50c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b50c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e01e40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b50c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4893000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511378c r4:85113400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8511378c r4:84c30000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b50c00 r8:84c3002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30000 r8:80287e08 r7:df845e60 r6:84c30300 r5:83b50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83e71e40 INFO: task kworker/0:2:3111 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:4:3114 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83b52400 r4:83b52400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b52400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa940 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b52400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6538c r4:84e65000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6538c r4:84c30180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b52400 r8:84c301ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30180 r8:80287e08 r7:df9c5e60 r6:84c30380 r5:83b52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8454e600 INFO: task kworker/0:4:3114 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/1:3:3115 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:841ca400 r4:841ca400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ca400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df997000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ebdb8c r4:84ebd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ebdb8c r4:8454f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ca400 r8:8454f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8454f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8454f980 r8:80287e08 r7:df98de60 r6:8454fd00 r5:841ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8457b5c0 INFO: task kworker/1:3:3115 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:5:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:841c8000 r4:841c8000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841c8000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa09c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85013b8c r4:85013800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85013b8c r4:84c30200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841c8000 r8:84c3022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30200 r8:80287e08 r7:df9c5e60 r6:8454fd80 r5:841c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c11140 INFO: task kworker/0:5:3118 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:6:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:841c9800 r4:841c9800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841c9800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d080 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df991000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c378c r4:850c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c378c r4:84c30480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841c9800 r8:84c304ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30480 r8:80287e08 r7:df9c5e60 r6:8454fe00 r5:841c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c27580 INFO: task kworker/0:6:3119 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:7:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:841c8c00 r4:841c8c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841c8c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09d40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514938c r4:85149000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514938c r4:84c30580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841c8c00 r8:84c305ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30580 r8:80287e08 r7:df9c5e60 r6:8454f080 r5:841c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84566f00 INFO: task kworker/0:7:3123 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:8:3124 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:841cec00 r4:841cec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301f40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df99d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85195b8c r4:85195800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85195b8c r4:84c30600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cec00 r8:84c3062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30600 r8:80287e08 r7:df9fde60 r6:843eba80 r5:841cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84534540 INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:9:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:841cd400 r4:841cd400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841cd400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e121c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514a38c r4:8514a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514a38c r4:84c30680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841cd400 r8:84c306ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30680 r8:80287e08 r7:df9fde60 r6:843ebb00 r5:841cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845343c0 INFO: task kworker/0:9:3127 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 INFO: task kworker/0:10:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83865400 r4:83865400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83865400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54680 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83865400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514af8c r4:8514ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514af8c r4:84c30700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83865400 r8:84c3072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30700 r8:80287e08 r7:dfa11e60 r6:84727000 r5:83865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8410ea40 INFO: task kworker/0:10:3130 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000013 r6:dfa35d8c r5:83861800 r4:83861800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83861800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e180 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83861800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514bf8c r4:8514bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8514bf8c r4:84c30400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83861800 r8:84c3042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30400 r8:80287e08 r7:dfa31e60 r6:84727200 r5:83861800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8457ae00 INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83860c00 r4:83860c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83860c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2f8c r4:853b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2f8c r4:84c30800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83860c00 r8:84c3082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30800 r8:80287e08 r7:dfa35e60 r6:8394bb80 r5:83860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574100 INFO: task kworker/0:12:3133 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3134 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83863c00 r4:83863c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83863c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536a900 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb253000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466838c r4:84668000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466838c r4:84c30880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83863c00 r8:84c308ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30880 r8:80287e08 r7:dfa49e60 r6:8394bb00 r5:83863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574100 INFO: task kworker/0:13:3134 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83866000 r4:83866000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83866000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1c00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83866000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8913000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466938c r4:84669000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466938c r4:84c30780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83866000 r8:84c307ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30780 r8:80287e08 r7:dfa4de60 r6:83348880 r5:83866000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845742c0 INFO: task kworker/0:14:3137 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3140 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83866c00 r4:83866c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83866c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1a40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466978c r4:84669400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466978c r4:84c30980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83866c00 r8:84c309ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30980 r8:80287e08 r7:dfa5de60 r6:83348800 r5:83866c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574240 INFO: task kworker/0:15:3140 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3141 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83863000 r4:83863000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83863000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467580 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83863000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85496f8c r4:85496c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85496f8c r4:84c30a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83863000 r8:84c30aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30a80 r8:80287e08 r7:dfa75e60 r6:83353580 r5:83863000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574600 INFO: task kworker/0:16:3141 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3143 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:8425e000 r4:8425e000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8425e000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8425e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85339b8c r4:85339800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85339b8c r4:84c30900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8425e000 r8:84c3092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30900 r8:80287e08 r7:dfa81e60 r6:83353500 r5:8425e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574540 INFO: task kworker/0:17:3143 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3144 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8425bc00 r4:8425bc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8425bc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574540 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8425bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533af8c r4:8533ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533af8c r4:84c30b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8425bc00 r8:84c30b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30b00 r8:80287e08 r7:dfa89e60 r6:843cef00 r5:8425bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574540 INFO: task kworker/0:18:3144 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:8425ec00 r4:8425ec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8425ec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aec80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8425ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d7f8c r4:854d7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d7f8c r4:84c30c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8425ec00 r8:84c30c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30c00 r8:80287e08 r7:dfa91e60 r6:843cee00 r5:8425ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845746c0 INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83b4d400 r4:83b4d400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b4d400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466a78c r4:8466a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466a78c r4:84c30b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b4d400 r8:84c30bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30b80 r8:80287e08 r7:dfaa1e60 r6:84c30100 r5:83b4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574780 INFO: task kworker/0:20:3148 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:83b56000 r4:83b56000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b56000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a680 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b56000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466ab8c r4:8466a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466ab8c r4:84c30c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b56000 r8:84c30cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30c80 r8:80287e08 r7:dfaa1e60 r6:84c30d00 r5:83b56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574a00 INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83393000 r4:83393000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83393000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80e80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83393000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560bb8c r4:8560b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560bb8c r4:84c30d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83393000 r8:84c30dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84c30d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c30d80 r8:80287e08 r7:dfaa1e60 r6:84c30a00 r5:83393000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84574a00 INFO: task kworker/0:22:3152 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:3554 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0015d84 r8:00000002 r7:60000113 r6:e0015d8c r5:84d99800 r4:84d99800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d99800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa140 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d99800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e53b8c r4:84e53800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e53b8c r4:84e78280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d99800 r8:84e782ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78280 r8:80287e08 r7:dffe1e60 r6:84e78380 r5:84d99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0015fb0 to 0xe0015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e7b500 INFO: task kworker/0:125:3554 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3572 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3572 tgid:3572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ce1800 r4:84ce1800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9ac00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ce1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ebcb8c r4:84ebc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ebcb8c r4:84e06280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce1800 r8:84e062ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e06280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06280 r8:80287e08 r7:e0045e60 r6:84e78800 r5:84ce1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe005dfb0 to 0xe005dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e08280 INFO: task kworker/1:109:3572 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3576 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffe9d84 r8:00000002 r7:60000113 r6:dffe9d8c r5:84d8bc00 r4:84d8bc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8bc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08a40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ebc38c r4:84ebc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ebc38c r4:84e06200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8bc00 r8:84e0622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e06200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06200 r8:80287e08 r7:e005de60 r6:84e06380 r5:84d8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe9fb0 to 0xdffe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e08500 INFO: task kworker/1:111:3576 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:3579 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:3579 tgid:3579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0071d84 r8:00000002 r7:60000113 r6:e0071d8c r5:84d8e000 r4:84d8e000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8e000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa340 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847d6f8c r4:847d6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847d6f8c r4:84e78900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8e000 r8:84e7892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78900 r8:80287e08 r7:e0015e60 r6:84e06180 r5:84d8e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0071fb0 to 0xe0071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa100 INFO: task kworker/0:126:3579 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:127:3580 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:127 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84d8a400 r4:84d8a400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8a400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e53f8c r4:84e53c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e53f8c r4:84e78a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8a400 r8:84e78a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78a00 r8:80287e08 r7:e0071e60 r6:84e06300 r5:84d8a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0075fb0 to 0xe0075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa100 INFO: task kworker/0:127:3580 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:128:3583 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:128 state:D stack:0 pid:3583 tgid:3583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84d8ec00 r4:84d8ec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8ec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa440 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6438c r4:84e64000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6438c r4:84e78a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8ec00 r8:84e78aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78a80 r8:80287e08 r7:df9d9e60 r6:84e06400 r5:84d8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa5c0 INFO: task kworker/0:128:3583 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:129:3586 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:129 state:D stack:0 pid:3586 tgid:3586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0069d84 r8:00000002 r7:60000113 r6:e0069d8c r5:84ce2400 r4:84ce2400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce2400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0069e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa640 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6478c r4:84e64400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6478c r4:84e78c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce2400 r8:84e78cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78c80 r8:80287e08 r7:df9d9e60 r6:84e78980 r5:84ce2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0069fb0 to 0xe0069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa480 INFO: task kworker/0:129:3586 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:3589 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:130 state:D stack:0 pid:3589 tgid:3589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84ce3c00 r4:84ce3c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce3c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa780 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e64b8c r4:84e64800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e64b8c r4:84e78b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce3c00 r8:84e78bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78b80 r8:80287e08 r7:df9d9e60 r6:84e78b00 r5:84ce3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0085fb0 to 0xe0085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfaac0 INFO: task kworker/0:130:3589 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:131:3590 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:131 state:D stack:0 pid:3590 tgid:3590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84ce4800 r4:84ce4800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce4800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e64f8c r4:84e64c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e64f8c r4:84e78d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce4800 r8:84e78d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78d00 r8:80287e08 r7:df9d9e60 r6:84e78c00 r5:84ce4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfaac0 INFO: task kworker/0:131:3590 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3593 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0095d84 r8:00000002 r7:60000013 r6:e0095d8c r5:84ce5400 r4:84ce5400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce5400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfac00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce5400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6578c r4:84e65400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6578c r4:84e78d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce5400 r8:84e78dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78d80 r8:80287e08 r7:df9d9e60 r6:84e78f00 r5:84ce5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0095fb0 to 0xe0095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa980 INFO: task kworker/0:132:3593 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:3594 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:3594 tgid:3594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:84ce6000 r4:84ce6000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce6000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8454e500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e65f8c r4:84e65c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e65f8c r4:84e78e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce6000 r8:84e78e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e78e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e78e00 r8:80287e08 r7:e0095e60 r6:84e78e80 r5:84ce6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfa980 INFO: task kworker/0:133:3594 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3596 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:84ce6c00 r4:84ce6c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ce6c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfae00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ce6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e65b8c r4:84e65800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e65b8c r4:84e11100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce6c00 r8:84e1112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11100 r8:80287e08 r7:e008de60 r6:84e11000 r5:84ce6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0099fb0 to 0xe0099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfabc0 INFO: task kworker/0:134:3596 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:3598 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000013 r6:e00a1d8c r5:84d94800 r4:84d94800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d94800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b940 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d94800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6638c r4:84e66000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6638c r4:84e11080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d94800 r8:84e110ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11080 r8:80287e08 r7:e008de60 r6:84e11200 r5:84d94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a1fb0 to 0xe00a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e7bdc0 INFO: task kworker/0:135:3598 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3600 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3600 tgid:3600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84d8c800 r4:84d8c800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8c800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74280 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e66f8c r4:84e66c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e66f8c r4:84e11280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8c800 r8:84e112ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11280 r8:80287e08 r7:e00a1e60 r6:84e06480 r5:84d8c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e7bdc0 INFO: task kworker/0:136:3600 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3603 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3603 tgid:3603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e009dd84 r8:00000002 r7:60000013 r6:e009dd8c r5:84d8b000 r4:84d8b000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8b000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6678c r4:84e66400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6678c r4:84e11180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8b000 r8:84e111ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11180 r8:80287e08 r7:e00a5e60 r6:84e06500 r5:84d8b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe009dfb0 to 0xe009dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74100 INFO: task kworker/0:137:3603 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:3606 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:3606 tgid:3606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00b5d84 r8:00000002 r7:60000013 r6:e00b5d8c r5:84d88c00 r4:84d88c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d88c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74200 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e66b8c r4:84e66800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e66b8c r4:84e11400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d88c00 r8:84e1142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11400 r8:80287e08 r7:e00a5e60 r6:84e06680 r5:84d88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b5fb0 to 0xe00b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e741c0 INFO: task kworker/0:138:3606 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3608 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3608 tgid:3608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84d8d400 r4:84d8d400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d8d400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74480 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6738c r4:84e67000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6738c r4:84e11380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d8d400 r8:84e113ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11380 r8:80287e08 r7:e00a5e60 r6:84e06580 r5:84d8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e742c0 INFO: task kworker/0:139:3608 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:3609 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00c1d84 r8:00000002 r7:60000113 r6:e00c1d8c r5:84d88000 r4:84d88000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d88000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74880 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d88000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e67f8c r4:84e67c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e67f8c r4:84e11500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d88000 r8:84e1152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11500 r8:80287e08 r7:e00bde60 r6:84e06600 r5:84d88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c1fb0 to 0xe00c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74440 INFO: task kworker/0:140:3609 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:3610 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:3610 tgid:3610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00c5d84 r8:00000002 r7:60000113 r6:e00c5d8c r5:84f4bc00 r4:84f4bc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f4bc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e6778c r4:84e67400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e6778c r4:84e11580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f4bc00 r8:84e115ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11580 r8:80287e08 r7:e00c1e60 r6:84e06700 r5:84f4bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c5fb0 to 0xe00c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74440 INFO: task kworker/0:141:3610 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3612 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:841f3000 r4:841f3000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841f3000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9a240 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0527000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ebc78c r4:84ebc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ebc78c r4:84e06780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841f3000 r8:84e067ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e06780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e06780 r8:80287e08 r7:e005de60 r6:84e06800 r5:841f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00cdfb0 to 0xe00cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f813c0 INFO: task kworker/1:112:3612 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:3613 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:3613 tgid:3613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d1d84 r8:00000002 r7:60000013 r6:e00d1d8c r5:84ca0000 r4:84ca0000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca0000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74700 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e67b8c r4:84e67800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e67b8c r4:84e11480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca0000 r8:84e114ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11480 r8:80287e08 r7:e00c1e60 r6:84e06880 r5:84ca0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d1fb0 to 0xe00d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74540 INFO: task kworker/0:142:3613 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:3616 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:3616 tgid:3616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d5d84 r8:00000002 r7:60000113 r6:e00d5d8c r5:84ca0c00 r4:84ca0c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca0c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74c00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e70b8c r4:84e70800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e70b8c r4:84e11300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca0c00 r8:84e1132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11300 r8:80287e08 r7:e00c1e60 r6:84e06900 r5:84ca0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d5fb0 to 0xe00d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74840 INFO: task kworker/0:143:3616 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:3617 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:3617 tgid:3617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d9d84 r8:00000002 r7:60000013 r6:e00d9d8c r5:84ca1800 r4:84ca1800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74a00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7038c r4:84e70000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7038c r4:84e11680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca1800 r8:84e116ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11680 r8:80287e08 r7:e00d5e60 r6:84e06980 r5:84ca1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d9fb0 to 0xe00d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74980 INFO: task kworker/0:144:3617 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:3621 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:3621 tgid:3621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84ca3c00 r4:84ca3c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca3c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74b40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7078c r4:84e70400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7078c r4:84e11780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca3c00 r8:84e117ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11780 r8:80287e08 r7:e00d5e60 r6:84e06a00 r5:84ca3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e5fb0 to 0xe00e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74a80 INFO: task kworker/0:145:3621 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:3622 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:3622 tgid:3622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00e9d84 r8:00000002 r7:60000113 r6:e00e9d8c r5:84ca2400 r4:84ca2400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca2400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74d40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca2400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e70f8c r4:84e70c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e70f8c r4:84e11600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca2400 r8:84e1162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11600 r8:80287e08 r7:e00d5e60 r6:84e06a80 r5:84ca2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e9fb0 to 0xe00e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74c40 INFO: task kworker/0:146:3622 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:3624 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:3624 tgid:3624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00f1d84 r8:00000002 r7:60000113 r6:e00f1d8c r5:84ca5400 r4:84ca5400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca5400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfaf80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e71b8c r4:84e71800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e71b8c r4:84e11880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca5400 r8:84e118ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11880 r8:80287e08 r7:e00e9e60 r6:84e06b00 r5:84ca5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f1fb0 to 0xe00f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74c40 INFO: task kworker/0:147:3624 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:3625 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:3625 tgid:3625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00f5d84 r8:00000002 r7:60000113 r6:e00f5d8c r5:84ca3000 r4:84ca3000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca3000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74e80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7138c r4:84e71000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7138c r4:84e11700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca3000 r8:84e1172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11700 r8:80287e08 r7:e00f1e60 r6:84e06b80 r5:84ca3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f5fb0 to 0xe00f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74f80 INFO: task kworker/0:148:3625 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:3627 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:3627 tgid:3627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00fdd84 r8:00000002 r7:60000113 r6:e00fdd8c r5:84ca4800 r4:84ca4800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca4800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00fde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08d80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7178c r4:84e71400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7178c r4:84e11800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca4800 r8:84e1182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11800 r8:80287e08 r7:e00f1e60 r6:84e06c00 r5:84ca4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00fdfb0 to 0xe00fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e74dc0 INFO: task kworker/0:149:3627 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:3630 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84d89800 r4:84d89800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d89800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0111e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90580 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d89800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7338c r4:84e73000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7338c r4:84e11a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d89800 r8:84e11a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11a00 r8:80287e08 r7:e00f1e60 r6:84e06c80 r5:84d89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0111fb0 to 0xe0111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84dfae80 INFO: task kworker/0:150:3630 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:3631 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3631 tgid:3631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0115d84 r8:00000002 r7:60000113 r6:e0115d8c r5:84ca8000 r4:84ca8000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca8000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0115e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b100 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e71f8c r4:84e71c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e71f8c r4:84e11980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca8000 r8:84e119ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11980 r8:80287e08 r7:e0111e60 r6:84e06d00 r5:84ca8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0115fb0 to 0xe0115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e08680 INFO: task kworker/0:151:3631 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:3633 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e011dd84 r8:00000002 r7:60000013 r6:e011dd8c r5:84ca9800 r4:84ca9800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca9800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7238c r4:84e72000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7238c r4:84e11a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca9800 r8:84e11aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11a80 r8:80287e08 r7:e0111e60 r6:84e06d80 r5:84ca9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe011dfb0 to 0xe011dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90080 INFO: task kworker/0:152:3633 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3635 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0125d84 r8:00000002 r7:60000113 r6:e0125d8c r5:84ca8c00 r4:84ca8c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ca8c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90180 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ca8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7278c r4:84e72400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7278c r4:84e11b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ca8c00 r8:84e11b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11b00 r8:80287e08 r7:e0111e60 r6:84e06e00 r5:84ca8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0125fb0 to 0xe0125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90280 INFO: task kworker/0:153:3635 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:3637 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:3637 tgid:3637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0131d84 r8:00000002 r7:60000113 r6:e0131d8c r5:84caa400 r4:84caa400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84caa400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0131e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90300 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84caa400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e72b8c r4:84e72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e72b8c r4:84e11c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84caa400 r8:84e11c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11c00 r8:80287e08 r7:e0111e60 r6:84e06e80 r5:84caa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0131fb0 to 0xe0131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90140 INFO: task kworker/0:154:3637 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:3639 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0139d84 r8:00000002 r7:60000113 r6:e0139d8c r5:84cab000 r4:84cab000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cab000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0139e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90440 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cab000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e72f8c r4:84e72c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e72f8c r4:84e11c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cab000 r8:84e11cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11c80 r8:80287e08 r7:e0111e60 r6:84e06f00 r5:84cab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0139fb0 to 0xe0139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f902c0 INFO: task kworker/0:155:3639 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:3642 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:3642 tgid:3642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e044dd84 r8:00000002 r7:60000113 r6:e044dd8c r5:84cac800 r4:84cac800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cac800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f906c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cac800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e7378c r4:84e73400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e7378c r4:84e11d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cac800 r8:84e11d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11d00 r8:80287e08 r7:e0111e60 r6:84e06f80 r5:84cac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f904c0 INFO: task kworker/0:156:3642 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3644 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3644 tgid:3644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:84cad400 r4:84cad400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cad400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90740 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cad400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e013f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e73b8c r4:84e73800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e73b8c r4:84e11d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cad400 r8:84e11dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11d80 r8:80287e08 r7:e044de60 r6:84df8d80 r5:84cad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0459fb0 to 0xe0459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90600 INFO: task kworker/0:157:3644 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:3646 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:3646 tgid:3646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0461d84 r8:00000002 r7:60000113 r6:e0461d8c r5:84caec00 r4:84caec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84caec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84caec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb4b8c r4:84fb4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb4b8c r4:84e11900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84caec00 r8:84e1192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11900 r8:80287e08 r7:e0459e60 r6:84df8f80 r5:84caec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0461fb0 to 0xe0461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90600 INFO: task kworker/0:158:3646 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:3647 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:84cabc00 r4:84cabc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cabc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90900 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0455000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e73f8c r4:84e73c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e73f8c r4:84e11e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cabc00 r8:84e11e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11e00 r8:80287e08 r7:e0461e60 r6:84df8800 r5:84cabc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0469fb0 to 0xe0469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90a00 INFO: task kworker/0:159:3647 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:3650 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:3650 tgid:3650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e047dd84 r8:00000002 r7:60000113 r6:e047dd8c r5:84cae000 r4:84cae000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cae000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90a80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb438c r4:84fb4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb438c r4:84e11f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cae000 r8:84e11f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11f00 r8:80287e08 r7:e0461e60 r6:84fa8000 r5:84cae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe047dfb0 to 0xe047dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90780 INFO: task kworker/0:160:3650 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:3651 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0481d84 r8:00000002 r7:60000013 r6:e0481d8c r5:84cb0000 r4:84cb0000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb0000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0475000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb478c r4:84fb4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb478c r4:84e11f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb0000 r8:84e11fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e11f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e11f80 r8:80287e08 r7:e0461e60 r6:84fa8080 r5:84cb0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0481fb0 to 0xe0481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90a40 INFO: task kworker/0:161:3651 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:3653 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0495d84 r8:00000002 r7:60000113 r6:e0495d8c r5:84cb1800 r4:84cb1800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0495e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f81040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb538c r4:84fb5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb538c r4:84fa2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb1800 r8:84fa202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2000 r8:80287e08 r7:e0461e60 r6:84fa8100 r5:84cb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0495fb0 to 0xe0495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90bc0 INFO: task kworker/0:162:3653 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:3656 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04a5d84 r8:00000002 r7:60000113 r6:e04a5d8c r5:84cb0c00 r4:84cb0c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb0c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90e40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0491000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb4f8c r4:84fb4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb4f8c r4:84fa2180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb0c00 r8:84fa21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2180 r8:80287e08 r7:e0495e60 r6:84fa8180 r5:84cb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a5fb0 to 0xe04a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90cc0 INFO: task kworker/0:163:3656 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:3657 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:3657 tgid:3657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04a9d84 r8:00000002 r7:60000113 r6:e04a9d8c r5:84cb3c00 r4:84cb3c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb3c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb578c r4:84fb5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb578c r4:84fa2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb3c00 r8:84fa222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2200 r8:80287e08 r7:e0495e60 r6:84fa8200 r5:84cb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a9fb0 to 0xe04a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f90d80 INFO: task kworker/0:164:3657 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:3659 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84cb4800 r4:84cb4800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb4800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf480 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb678c r4:84fb6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb678c r4:84fa2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb4800 r8:84fa20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2080 r8:80287e08 r7:e04a9e60 r6:84fa8280 r5:84cb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f81dc0 INFO: task kworker/0:165:3659 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:3662 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d1d84 r8:00000002 r7:60000013 r6:e04d1d8c r5:84cb2400 r4:84cb2400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb2400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb5b8c r4:84fb5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb5b8c r4:84fa2300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb2400 r8:84fa232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2300 r8:80287e08 r7:e04b9e60 r6:84fa8300 r5:84cb2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d1fb0 to 0xe04d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84faf080 INFO: task kworker/0:166:3662 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb5f8c r4:84fb5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb5f8c r4:84fa2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ce3000 r8:84fa22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2280 r8:80287e08 r7:e04b9e60 r6:84fa2400 r5:84ce3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84faf280 INFO: task kworker/0:167:3663 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:3666 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:841f5400 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf340 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb638c r4:84fb6000 r7:dddced80 r6:83018000 r5:84fb638c r4:84fa2380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:84d9d400 r5:84d9d400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0503000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb738c r4:84fb7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb738c r4:84fa2100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d9d400 r8:84fa212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2100 r8:80287e08 r7:e04b9e60 r6:84fa2580 r5:84d9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84faf3c0 INFO: task kworker/0:169:3669 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04edd84 r8:00000002 r7:60000013 r6:e04edd8c r5:84cf0000 r4:84cf0000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf0000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb6b8c r4:84fb6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb6b8c r4:84fa2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf0000 r8:84fa262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2600 r8:80287e08 r7:e04e5e60 r6:84fa2480 r5:84cf0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84faf500 INFO: task kworker/0:170:3670 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:3672 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:3672 tgid:3672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84cf0c00 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf780 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84cf0c00 r8:84fa26ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:3674 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84cf2400 r4:8291a680 [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/0:173:3676 blocked for more than 452 seconds. r10:8291a684 r9:e0519d84 r8:00000002 r7:60000113 r6:e0519d8c r5:84cf3c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fafc80 r5:00001000 r4:e050f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fb7b8c r4:84fb7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fb7b8c r4:84fa2980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf3c00 r8:84fa29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2980 r8:80287e08 r7:e0501e60 r6:84fa2a80 r5:84cf3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fafa80 INFO: task kworker/0:173:3676 is blocked on a mutex likely owned by task kworker/0:123:3540. 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:84faf940 Workqueue: events bpf_prog_free_deferred 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 r4:00000000 r5:84e5378c r4:84e53400 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3679 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0525d84 r8:00000002 r7:60000013 r6:e0525d8c r5:84cb6000 r4:84cb6000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb6000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff038c r4:84ff0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ff038c r4:84fa2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cb6000 r8:84fa2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2a00 r8:80287e08 r7:e051de60 r6:84fa8400 r5:84cb6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0525fb0 to 0xe0525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84fafe40 INFO: task kworker/0:175:3679 is blocked on a mutex likely owned by task kworker/0:123:3540. Call trace: 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cb6c00 r8:84fa2bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa2b80 r8:80287e08 r7:e0525e60 r6:84fa8480 r5:84cb6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00adfb0 to 0xe00adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8502d100 INFO: task kworker/0:176:3683 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d87ac0 r5:84cb3000 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:178 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff178c r4:84ff1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ff178c r4:84fa2b00 r10:61c88647 r9:84cf1800 r8:84fa2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:113:3690 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:84cf5400 r4:84cf5400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf5400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8457b980 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cf5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ebcf8c r4:84ebcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ebcf8c r4:84fa8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf5400 r8:84fa852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fa8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fa8500 r8:80287e08 r7:e005de60 r6:84fa2c80 r5:84cf5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8457b640 INFO: task kworker/1:113:3690 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfeb3000 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:3692 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e054dd84 r8:00000002 r7:60000013 r6:e054dd8c r5:84cf6000 r4:84cf6000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf6000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e054de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfa69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff138c r4:84ff1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ff138c r4:84fa2880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf6000 r8:84fa28ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fa2880 r10:00000000 r9:84fa2880 r8:80287e08 r7:e0539e60 r6:84fa2d80 r5:84cf6000 INFO: task kworker/0:179:3692 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84e5378c r4:84e53400 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ebd78c r4:84ebd400 r10:61c88647 r9:84cf6c00 r8:84fa86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001 1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:3696 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:84ca6c00 r4:84ca6c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dd80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3698 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08 r5:84ebd38c r4:84ebd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/1:115:3698 is blocked on a mutex likely owned by task kworker/0:123:3540. 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84e5378c r4:84e53400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:3699 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84cb9800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d1c0 r5:84ff278c r4:84ff2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc6-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502df00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cba400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff1f8c r4:84ff1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ff1f8c r4:8502b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cba400 r8:8502b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8502b000 r8:80287e08 r7:e0579e60 r6:84fa8880 r5:84cba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe057dfb0 to 0xe057dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8502de00 INFO: task kworker/0:182:3700 is blocked on a mutex likely owned by task kworker/0:123:3540. Exception stack(0xdffe1d28 to 0xdffe1d70) r4:00000000 r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:3702 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0585d84 r8:00000002 r7:60000013 r6:e0585d8c r5:84cb8000 r4:84cb8000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cb8000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84ff238c r4:84ff2000 r10:61c88647 r9:84cb8000 r8:8502b12c r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r10:8291a684 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84cbb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800f0013 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84cbd400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cbd400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac21e4 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/0:186:3708 blocked for more than 452 seconds. [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ff978c r4:84ff9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ff978c r4:8502b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cbc800 r8:8502b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8502b380 [<80287e08>] (worker_t <> dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1d80 r8:80287e08 r7:eb979e60 r6:852f7380 r5:84248000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534f480 INFO: task kworker/1:766:5338 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5339 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:84248c00 r4:84248c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84248c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbf40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84248c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554938c r4:85549000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554938c r4:855b1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84248c00 r8:855b1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1e00 r8:80287e08 r7:eb991e60 r6:852f7400 r5:84248c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534f480 INFO: task kworker/1:767:5339 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5341 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:8424a400 r4:8424a400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8424a400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855983c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554a78c r4:8554a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554a78c r4:855b1d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8424a400 r8:855b1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1d00 r8:80287e08 r7:eb995e60 r6:852f7480 r5:8424a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534f7c0 INFO: task kworker/1:768:5341 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c1e90000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5344 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:84249800 r4:84249800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84249800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc880 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84249800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb425000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554978c r4:85549400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554978c r4:855b1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84249800 r8:855b1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1f00 r8:80287e08 r7:eb99de60 r6:852f7500 r5:84249800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bcf00 INFO: task kworker/1:769:5344 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5345 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:85526c00 r4:85526c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4a80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb441000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85549b8c r4:85549800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85549b8c r4:855b1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526c00 r8:855b1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1e80 r8:80287e08 r7:eb99de60 r6:855b1880 r5:85526c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a4a00 INFO: task kworker/1:770:5345 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5348 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:85526000 r4:85526000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598000 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85526000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb479000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85549f8c r4:85549c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85549f8c r4:855b1f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526000 r8:855b1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1f80 r8:80287e08 r7:eb99de60 r6:855b1900 r5:85526000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9adfb0 to 0xeb9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85598100 INFO: task kworker/1:771:5348 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c2c51000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5350 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:855d0000 r4:855d0000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d0000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8554a38c r4:8554a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855d0000 r8:85483cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85598180 INFO: task kworker/1:772:5350 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5352 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000013 r6:eb9b1d8c r5:855d1800 r4:855d1800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855987c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb619000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554af8c r4:8554ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554af8c r4:8559c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d1800 r8:8559c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8559c000 r8:80287e08 r7:eb99de60 r6:8559c180 r5:855d1800 r4:85598380 [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:8554ab8c r4:8554a800 r10:61c88647 r9:855d0c00 r8:8559c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85598280 INFO: task kworker/1:774:5354 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5356 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:775 state:D stack:0 pid:5356 tgid:5356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:8424b000 r4:8424b000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8424b000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598900 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554b38c r4:8554b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554b38c r4:8559c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8424b000 r8:8559c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c300 r8:80287e08 r7:eb9b1e60 r6:852f7580 r5:8424b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855989c0 INFO: task kworker/1:775:5356 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c3a6a000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:776:5358 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000013 r6:eb9c1d8c r5:8424bc00 r4:8424bc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8424bc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598a80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554b78c r4:8554b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554b78c r4:8559c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8424bc00 r8:8559c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c200 r8:80287e08 r7:eb9bde60 r6:852f7600 r5:8424bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85598840 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:777:5360 blocked for more than 475 seconds. r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8424e000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb717000 r5:8554bf8c r4:8554bc00 r10:61c88647 r9:8424e000 r8:8559c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) r4:85598a40 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:5362 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:8424c800 r4:8424c800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8424c800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598b00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554bb8c r4:8554b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554bb8c r4:8559c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8424c800 r8:8559c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c480 r8:80287e08 r7:eb9c9e60 r6:852f7700 r5:8424c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85598c80 INFO: task kworker/1:778:5362 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c464c000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/1:779:5364 blocked for more than 475 seconds. Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85550f8c r4:85550c00 r10:61c88647 r9:85578000 r8:8559c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5366 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:8557ec00 r4:8557ec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8557ec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598e00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555038c r4:85550000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555038c r4:8559c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8557ec00 r8:8559c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c280 r8:80287e08 r7:eb9d9e60 r6:852f7800 r5:8557ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c4ad6000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5367 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:8424d400 r4:8424d400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8424d400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8555078c r4:85550400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8424d400 r8:8559c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r4:00000000 r5:85ef9f8c r4:85ef9c00 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:84d87ac0 task:kworker/1:782 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a280 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8424ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85550b8c r4:85550800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85550b8c r4:8559c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8424ec00 r8:8559c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c680 r8:80287e08 r7:eb9d9e60 r6:852f7900 r5:8424ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559a240 INFO: task kworker/1:782:5370 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc6-syzkaller #0 r4:84e20c00 [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84e20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:8555138c r4:85551000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8559c700 Exception stack(0xeb861fb0 to 0xeb861ff8) r4:8559a340 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:784:5375 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:84e20000 r4:84e20000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e20000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e20000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e891f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555178c r4:85551400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555178c r4:8559c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e20000 r8:8559c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c600 r8:80287e08 r7:eb861e60 r6:852f7980 r5:84e20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559a440 INFO: task kworker/1:784:5375 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r5:85ef9f8c r4:85ef9c00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:785:5377 blocked for more than 475 seconds. r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:84e23000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85551b8c r4:8559c780 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5379 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:84e23c00 r4:84e23c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e23c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ab00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555278c r4:85552400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555278c r4:8559c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e23c00 r8:8559c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c880 r8:80287e08 r7:eb901e60 r6:852f7b00 r5:84e23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559a500 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85551f8c r4:85551c00 r10:61c88647 r9:84e22400 r8:8559c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c5bcc000 dfeb5000 00000001 80239b98 7f081000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r5:00001000 r4:dfa13000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:84d87ac0 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:855d3000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8555238c r4:85552000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555238c r4:8559c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d3000 r8:8559c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c980 r8:80287e08 r7:eb91de60 r6:8559ca00 r5:855d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559a800 INFO: task kworker/1:788:5382 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c5f26000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5385 blocked for more than 476 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559acc0 r5:85552b8c r4:85552800 r10:61c88647 r9:855d4800 r8:8559c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb941fb0 to 0xeb941ff8) r4:8559ac00 Workqueue: events bpf_prog_free_deferred 1d20: c6340000 dfeb5000 00000001 80239b98 7f081000 00000001 r4:dffe1dc0 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5388 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb945d84 r8:00000002 r7:60000013 r6:eb945d8c r5:855d5400 r4:855d5400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d5400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ad40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85552f8c r4:85552c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85552f8c r4:8559c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d5400 r8:8559c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559c800 r8:80287e08 r7:eb941e60 r6:8559cb80 r5:855d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559ac80 INFO: task kworker/1:790:5388 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5389 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb815d84 r8:00000002 r7:60000013 r6:eb815d8c r5:855d6000 r4:855d6000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d6000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8555338c r4:85553000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555338c r4:8559cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d6000 r8:8559cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559cc00 r8:80287e08 r7:eb945e60 r6:8559ca80 r5:855d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559ac80 INFO: task kworker/1:791:5389 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:8555378c r4:85553400 r10:61c88647 r9:855d3c00 r8:8559ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559ad80 [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:00001000 r4:dfa13000 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5392 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:855d2400 r4:855d2400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d2400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85553f8c r4:85553c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85553f8c r4:8559ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d2400 r8:8559ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8559ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559ce00 r8:80287e08 r7:eb969e60 r6:8559cd00 r5:855d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555e400 INFO: task kworker/1:793:5392 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7203000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855d8000 r4:8291a680 [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2e5000 r5:85553b8c r4:85553800 r10:61c88647 r9:855d8000 r8:85483fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5398 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f9d84 r8:00000002 r7:60000113 r6:eb9f9d8c r5:84e26000 r4:84e26000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e26000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf180 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e26000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:eb497000 r5:8555438c r4:85554000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8559cf80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 r4:00000000 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r4:84e0be80 Exception stack(0xdffe1fb0 to 0xdffe1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb4bf000 r5:8555478c r4:85554400 r10:61c88647 r9:84e26c00 r8:855c802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85555f8c r4:85555c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85555f8c r4:855c8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e21800 r8:855c80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8080 r8:80287e08 r7:eb9fde60 r6:852f7d00 r5:84e21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bf2c0 INFO: task kworker/1:797:5401 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:85554b8c r4:85554800 r10:61c88647 r9:8551ec00 r8:855c812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeba09fb0 to 0xeba09ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r4:dffe1dc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:799:5404 blocked for more than 476 seconds. r4:855d8c00 [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb669000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85554f8c r4:85554c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85554f8c r4:855c8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d8c00 r8:855c81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8180 r8:80287e08 r7:eba05e60 r6:855c8280 r5:855d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bf440 INFO: task kworker/1:799:5404 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c8891000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5406 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8555538c r4:855c8300 r4:855c8300 1fa0: 00000000 00000000 00000000 00000000 [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 r4:00000000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aef80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84dd0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8466af8c r4:8466ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8466af8c r4:852f7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dd0000 r8:852f7e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852f7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f7e00 r8:80287e08 r7:eb8d5e60 r6:852f7f80 r5:84dd0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855aec40 INFO: task kworker/0:337:5409 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84dd1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf980 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8555578c r4:85555400 r7:ddde2d80 r6:83018200 r5:8555578c r4:855c8200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:84d87ac0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfb00 r9:83018205 r8:84dd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85555b8c r4:85555800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85555b8c r4:855c8500 r10:61c88647 r9:84dd2400 r8:855c852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8500 r4:00000001 Exception stack(0xeba1dfb0 to 0xeba1dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d20: c8daf000 dfeb5000 00000001 80239b98 7f081000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:00000000 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5416 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84dd3c00 r4:84dd3c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dd3c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfd80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555638c r4:85556000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555638c r4:855c8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dd3c00 r8:855c85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8580 r8:80287e08 r7:eba05e60 r6:85384000 r5:84dd3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bfb80 INFO: task kworker/1:803:5416 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c911b000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5419 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba31d84 r8:00000002 r7:60000013 r6:eba31d8c r5:84dd3000 r4:84dd3000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dd3000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfe80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555678c r4:85556400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555678c r4:855c8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dd3000 r8:855c84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8480 r8:80287e08 r7:eba25e60 r6:85384180 r5:84dd3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bfdc0 INFO: task kworker/1:804:5419 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c958f000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5420 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:84dd4800 r4:84dd4800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dd4800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5380 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dd4800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8555738c r4:85557000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555738c r4:855c8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84dd4800 r8:855c86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8680 r8:80287e08 r7:eba31e60 r6:85384080 r5:84dd4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bfec0 INFO: task kworker/1:805:5420 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c961c000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r4:84e0be80 Exception stack(0xdffe1fb0 to 0xdffe1ff8) INFO: task kworker/0:338:5421 blocked for more than 476 seconds. r10:8291a684 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:84dd6000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8564478c r4:85644400 r10:61c88647 r9:84dd6000 r8:8538412c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ae440 INFO: task kworker/0:338:5421 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: c9819000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84dd6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:85556b8c r4:85556800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r4:00000001 r4:84d87ac0 task:kworker/1:807 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5240 r5:85556f8c r4:85556c00 r7:ddde2d80 r6:83018200 r5:85556f8c r4:855c8780 r4:00000001 r4:855c50c0 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5427 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:84dd0c00 r4:84dd0c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84dd0c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5400 r5:8555778c r4:85557400 r7:ddde2d80 r6:83018200 r5:8555778c r4:855c8380 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 task:kworker/1:809 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85588000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85557b8c r4:85557800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85557b8c r4:855c8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85588000 r8:855c882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8800 r8:80287e08 r7:eba45e60 r6:85384400 r5:85588000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855c5100 INFO: task kworker/1:809:5430 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca212000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 Not tainted 6.15.0-rc6-syzkaller #0 Call trace: r5:855db000 r4:8291a680 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855db000 r8:855c872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r5:85ef9f8c r4:85ef9c00 r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdffe1fb0 to 0xdffe1ff8) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eba4dd84 r8:00000002 r7:60000013 r6:eba4dd8c r5:855da400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8560838c r4:85608000 r7:ddde2d80 r6:83018200 r5:8560838c r4:855c8900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: ca668000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5435 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba55d84 r8:00000002 r7:60000013 r6:eba55d8c r5:855dc800 r4:855dc800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dc800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5c40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560878c r4:85608400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560878c r4:855c8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dc800 r8:855c88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8880 r8:80287e08 r7:eba4de60 r6:855c8a00 r5:855dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855c5780 INFO: task kworker/1:812:5435 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 Exception stack(0xdffe1d28 to 0xdffe1d70) r4:82ac21e4 r4:00000000 r5:85ef9f8c r4:85ef9c00 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/0:339:5438 blocked for more than 476 seconds. [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85384480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85384480 r8:80287e08 r7:eba39e60 r6:855c8b00 r5:855dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85370600 INFO: task kworker/0:339:5438 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ca92e000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:813:5440 blocked for more than 476 seconds. r10:8291a684 r9:eba5dd84 r8:00000002 r7:60000013 r6:eba5dd8c r5:855dd400 [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85608b8c r4:85608800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855c8b80 r8:80287e08 r7:eba55e60 r6:855c8d00 r5:855dd400 r4:855c5c00 Workqueue: events bpf_prog_free_deferred 1d20: cacff000 dfeb5000 00000001 80239b98 7f081000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855de000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 r5:85608f8c r4:85608c00 r4:855c8c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5444 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba15d84 r8:00000002 r7:60000013 r6:eba15d8c r5:855dbc00 r4:855dbc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855dbc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c59c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560938c r4:85609000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560938c r4:855c8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dbc00 r8:855c8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8c80 r8:80287e08 r7:eba59e60 r6:855c8e80 r5:855dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855c5ec0 INFO: task kworker/1:815:5444 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb053000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:8560978c r4:85609400 r4:8559cf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:855bfec0 INFO: task kworker/1:816:5446 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb053000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:855e0000 [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560a38c r4:8560a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560a38c r4:855c8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e0000 r8:855c8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c8d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c8d80 r8:80287e08 r7:eb985e60 r6:855c8f80 r5:855e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855bfec0 INFO: task kworker/1:817:5448 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb464000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:818 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85609b8c r4:84fab080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb464000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5452 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85609f8c r4:85609c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85609f8c r4:84fab100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e0c00 r8:84fab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab100 r8:80287e08 r7:eb9a1e60 r6:84fab280 r5:855e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba6dfb0 to 0xeba6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f80240 INFO: task kworker/1:819:5452 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 1d60: 80230ad0 80239bb0 80070013 ffffffff r4:dffe1dc0 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:820 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855e3000 r8:84fab1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 1d60: 80230ad0 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 INFO: task kworker/1:821:5457 blocked for more than 476 seconds. r10:8291a684 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:855e3c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8560b38c r4:8560b000 r7:ddde2d80 r6:83018200 r5:8560b38c r4:84fab200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cb9dc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5458 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:855e4800 r4:855e4800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e4800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80840 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560ab8c r4:8560a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560ab8c r4:84fab480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e4800 r8:84fab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab480 r8:80287e08 r7:eba71e60 r6:84fab300 r5:855e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f80780 INFO: task kworker/1:822:5458 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cbd86000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5461 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:855e5400 r4:855e5400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e5400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80a00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560af8c r4:8560ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560af8c r4:84fab500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e5400 r8:84fab52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:80287e08 r7:eba71e60 r6:84fab600 r5:855e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f809c0 INFO: task kworker/1:823:5461 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc051000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5462 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000113 r6:eba7dd8c r5:855e6000 r4:855e6000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e6000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80d00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560b78c r4:8560b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560b78c r4:84fab680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6000 r8:84fab6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab680 r8:80287e08 r7:eba71e60 r6:84fab580 r5:855e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f80a80 INFO: task kworker/1:824:5462 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc051000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5464 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5464 tgid:5464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:855e6c00 r4:855e6c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e6c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560bf8c r4:8560bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560bf8c r4:84fab700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6c00 r8:84fab72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab700 r8:80287e08 r7:eba7de60 r6:84fab880 r5:855e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f80cc0 INFO: task kworker/1:825:5464 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5467 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:855e2400 r4:855e2400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e2400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d140 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb643000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561438c r4:85614000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561438c r4:84fab780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e2400 r8:84fab7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab780 r8:80287e08 r7:eba81e60 r6:84fab800 r5:855e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d200 INFO: task kworker/1:826:5467 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:5469 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba89d84 r8:00000002 r7:60000013 r6:eba89d8c r5:855e8000 r4:855e8000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb723000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85614b8c r4:85614800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85614b8c r4:84fab900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8000 r8:84fab92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fab900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab900 r8:80287e08 r7:eba85e60 r6:84fab980 r5:855e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba89fb0 to 0xeba89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d100 INFO: task kworker/1:827:5469 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5471 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5471 tgid:5471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:855e8c00 r4:855e8c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d340 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb707000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561478c r4:85614400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561478c r4:84faba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8c00 r8:84faba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84faba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84faba00 r8:80287e08 r7:eba89e60 r6:84fabb80 r5:855e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d440 INFO: task kworker/1:828:5471 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cc887000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5472 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba95d84 r8:00000002 r7:60000013 r6:eba95d8c r5:855e9800 r4:855e9800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e9800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85614f8c r4:85614c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85614f8c r4:84faba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e9800 r8:84fabaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84faba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84faba80 r8:80287e08 r7:eba89e60 r6:84fabc80 r5:855e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d5c0 INFO: task kworker/1:829:5472 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ccb42000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5475 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:855ea400 r4:855ea400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ea400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d800 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb759000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561538c r4:85615000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561538c r4:84fabc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ea400 r8:84fabc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabc00 r8:80287e08 r7:eba95e60 r6:84fabd00 r5:855ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d680 INFO: task kworker/1:830:5475 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cceab000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5477 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:855eb000 r4:855eb000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855eb000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561578c r4:85615400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561578c r4:84fabb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855eb000 r8:84fabb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabb00 r8:80287e08 r7:eba91e60 r6:84fabe80 r5:855eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba9dfb0 to 0xeba9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d740 INFO: task kworker/1:831:5477 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cceab000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:5478 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:8558b000 r4:8558b000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558b000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476040 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85644b8c r4:85644800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85644b8c r4:85384580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558b000 r8:853845ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85384580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85384580 r8:80287e08 r7:eba61e60 r6:85384600 r5:8558b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa5fb0 to 0xebaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85370940 INFO: task kworker/0:340:5478 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd326000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5480 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000013 r6:ebaadd8c r5:8558c800 r4:8558c800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558c800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3db40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85615b8c r4:85615800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85615b8c r4:84fabd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558c800 r8:84fabdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabd80 r8:80287e08 r7:eba9de60 r6:85384500 r5:8558c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3d980 INFO: task kworker/1:832:5480 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd413000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:5482 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:8558d400 r4:8558d400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558d400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3dbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb933000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85615f8c r4:85615c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85615f8c r4:84fabe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558d400 r8:84fabe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabe00 r8:80287e08 r7:ebaade60 r6:85384680 r5:8558d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3db00 INFO: task kworker/1:833:5482 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd413000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5483 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5483 tgid:5483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:8558bc00 r4:8558bc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558bc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3de40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561638c r4:85616000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561638c r4:84fabf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558bc00 r8:84fabfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabf80 r8:80287e08 r7:ebab5e60 r6:85384700 r5:8558bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3dcc0 INFO: task kworker/1:834:5483 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5487 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:8558e000 r4:8558e000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558e000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370940 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb965000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561678c r4:85616400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561678c r4:8546f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558e000 r8:8546f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f000 r8:80287e08 r7:ebab9e60 r6:85384780 r5:8558e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3de00 INFO: task kworker/1:835:5487 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:5488 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:8558ec00 r4:8558ec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558ec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476340 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb997000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85644f8c r4:85644c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85644f8c r4:85384900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558ec00 r8:8538492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85384900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85384900 r8:80287e08 r7:eba61e60 r6:85384800 r5:8558ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85476140 INFO: task kworker/0:341:5488 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5489 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:8558a400 r4:8558a400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558a400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4000 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85616b8c r4:85616800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85616b8c r4:8546f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558a400 r8:8546f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f080 r8:80287e08 r7:ebaa1e60 r6:85384880 r5:8558a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac1fb0 to 0xebac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853700c0 INFO: task kworker/1:836:5489 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:5495 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:85589800 r4:85589800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85589800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564578c r4:85645400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564578c r4:85384a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85589800 r8:85384aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85384a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85384a80 r8:80287e08 r7:ebab1e60 r6:85384b00 r5:85589800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85476540 INFO: task kworker/0:343:5495 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce415000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5497 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:84e24800 r4:84e24800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e24800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4200 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e24800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85616f8c r4:85616c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85616f8c r4:8546f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e24800 r8:8546f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f200 r8:80287e08 r7:ebac1e60 r6:85384b80 r5:84e24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba99fb0 to 0xeba99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4080 INFO: task kworker/1:837:5497 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce415000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5498 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5498 tgid:5498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:84e25400 r4:84e25400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e25400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601500 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e25400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85645b8c r4:85645800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85645b8c r4:85384c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e25400 r8:85384c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85384c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85384c00 r8:80287e08 r7:ebab1e60 r6:85384c80 r5:84e25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854766c0 INFO: task kworker/0:344:5498 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5500 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae5d84 r8:00000002 r7:60000113 r6:ebae5d8c r5:84d60c00 r4:84d60c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d60c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4340 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebadd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561738c r4:85617000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561738c r4:8546f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d60c00 r8:8546f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f280 r8:80287e08 r7:eba99e60 r6:85384d00 r5:84d60c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f41c0 INFO: task kworker/1:838:5500 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5502 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:84d62400 r4:84d62400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d62400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f43c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561778c r4:85617400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561778c r4:8546f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d62400 r8:8546f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f300 r8:80287e08 r7:ebae5e60 r6:85384d80 r5:84d62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4280 INFO: task kworker/1:839:5502 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: ce8ee000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:5504 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:84d61800 r4:84d61800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d61800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4700 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d61800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85617f8c r4:85617c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85617f8c r4:8546f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d61800 r8:8546f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f380 r8:80287e08 r7:ebaf1e60 r6:85384e00 r5:84d61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4400 INFO: task kworker/1:840:5504 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf133000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5506 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84d63c00 r4:84d63c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d63c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4580 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85617b8c r4:85617800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85617b8c r4:8546f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d63c00 r8:8546f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f180 r8:80287e08 r7:ebb05e60 r6:85384e80 r5:84d63c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4400 INFO: task kworker/1:841:5506 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf133000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5508 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:84d60000 r4:84d60000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d60000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4880 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d60000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561c38c r4:8561c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561c38c r4:8546f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d60000 r8:8546f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f400 r8:80287e08 r7:ebb05e60 r6:85384f00 r5:84d60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f44c0 INFO: task kworker/1:842:5508 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cf4f5000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:5510 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:84d64800 r4:84d64800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d64800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476d00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d64800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561db8c r4:8561d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561db8c r4:8546f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d64800 r8:8546f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f500 r8:80287e08 r7:ebb1de60 r6:85384f80 r5:84d64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4840 INFO: task kworker/1:843:5510 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5512 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:844 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:84d66000 r4:84d66000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d66000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4940 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d66000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561c78c r4:8561c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561c78c r4:8546f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d66000 r8:8546f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f480 r8:80287e08 r7:ebb35e60 r6:85600000 r5:84d66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4840 INFO: task kworker/1:844:5512 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5513 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000013 r6:ebb41d8c r5:84d65400 r4:84d65400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d65400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4840 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d65400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561cb8c r4:8561c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561cb8c r4:8546f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d65400 r8:8546f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f580 r8:80287e08 r7:ebb35e60 r6:85600080 r5:84d65400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4980 INFO: task kworker/1:845:5513 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:846:5515 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:846 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:85680000 r4:85680000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85680000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561cf8c r4:8561cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561cf8c r4:8546f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680000 r8:8546f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f680 r8:80287e08 r7:ebb35e60 r6:85600100 r5:85680000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4ac0 INFO: task kworker/1:846:5515 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5517 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:855ebc00 r4:855ebc00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ebc00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4d40 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561d38c r4:8561d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561d38c r4:8546f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ebc00 r8:8546f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f700 r8:80287e08 r7:ebb35e60 r6:8546f780 r5:855ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4b40 INFO: task kworker/1:847:5517 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5520 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:855ed400 r4:855ed400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ed400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561d78c r4:8561d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561d78c r4:8546f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ed400 r8:8546f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f100 r8:80287e08 r7:ebb35e60 r6:8546f800 r5:855ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854769c0 INFO: task kworker/1:848:5520 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0623000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:5523 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae1d84 r8:00000002 r7:60000013 r6:ebae1d8c r5:855eec00 r4:855eec00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855eec00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561df8c r4:8561dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561df8c r4:8546f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855eec00 r8:8546f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f880 r8:80287e08 r7:ebb35e60 r6:8546f980 r5:855eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f4f40 INFO: task kworker/1:849:5523 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5525 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:855f0000 r4:855f0000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f0000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9000 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561e38c r4:8561e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561e38c r4:8546f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f0000 r8:8546f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f600 r8:80287e08 r7:ebae1e60 r6:8546fa80 r5:855f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9080 INFO: task kworker/1:850:5525 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5526 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000013 r6:ebb8dd8c r5:855f1800 r4:855f1800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f1800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9440 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561e78c r4:8561e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561e78c r4:8546f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f1800 r8:8546f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546f900 r8:80287e08 r7:ebb69e60 r6:8546fa00 r5:855f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9280 INFO: task kworker/1:851:5526 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5529 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:855f0c00 r4:855f0c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855f0c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9740 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561ef8c r4:8561ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561ef8c r4:8546fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855f0c00 r8:8546fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fb00 r8:80287e08 r7:ebb8de60 r6:8546fc80 r5:855f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9200 INFO: task kworker/1:852:5529 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5530 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000013 r6:ebb71d8c r5:85682400 r4:85682400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85682400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9600 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561eb8c r4:8561e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561eb8c r4:8546fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85682400 r8:8546fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fb80 r8:80287e08 r7:ebb95e60 r6:85600180 r5:85682400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9200 INFO: task kworker/1:853:5530 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5533 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:85680c00 r4:85680c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9880 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85680c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f38c r4:8561f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561f38c r4:8546fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680c00 r8:8546fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fd80 r8:80287e08 r7:ebb95e60 r6:85600280 r5:85680c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9240 INFO: task kworker/1:854:5533 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5536 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:85684800 r4:85684800 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85684800 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9940 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f78c r4:8561f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561f78c r4:8546fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85684800 r8:8546fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fe00 r8:80287e08 r7:ebba9e60 r6:85600380 r5:85684800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b97c0 INFO: task kworker/1:855:5536 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:856:5538 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:856 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:85683c00 r4:85683c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9a80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85683c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561fb8c r4:8561f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561fb8c r4:8546fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683c00 r8:8546feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fe80 r8:80287e08 r7:ebbb9e60 r6:85600400 r5:85683c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc5fb0 to 0xebbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9980 INFO: task kworker/1:856:5538 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5540 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000013 r6:ebbd9d8c r5:85685400 r4:85685400 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85685400 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85685400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561ff8c r4:8561fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561ff8c r4:8546ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85685400 r8:8546ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546ff00 r8:80287e08 r7:ebbc5e60 r6:85600480 r5:85685400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd9fb0 to 0xebbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b99c0 INFO: task kworker/1:857:5540 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:5542 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85686c00 r4:85686c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9d80 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85686c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562438c r4:85624000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562438c r4:8546fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686c00 r8:8546fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8546fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8546fd00 r8:80287e08 r7:ebbd9e60 r6:85600500 r5:85686c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9b00 INFO: task kworker/1:858:5542 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5544 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85686000 r4:85686000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9200 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624b8c r4:85624800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85624b8c r4:855b1a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686000 r8:855b1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855b1a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b1a00 r8:80287e08 r7:ebbdde60 r6:85600580 r5:85686000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe1fb0 to 0xebbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9d40 INFO: task kworker/1:859:5544 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:860:5546 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:860 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000013 r6:ebbe5d8c r5:85683000 r4:85683000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85683000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0533000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562478c r4:85624400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562478c r4:84fabf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683000 r8:84fabf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fabf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabf00 r8:80287e08 r7:ebbe1e60 r6:85600600 r5:85683000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9c40 INFO: task kworker/1:860:5546 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5548 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:84d66c00 r4:84d66c00 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d66c00 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc000 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624f8c r4:85624c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85624f8c r4:856bd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d66c00 r8:856bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856bd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd000 r8:80287e08 r7:ebbe1e60 r6:85600680 r5:84d66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe9fb0 to 0xebbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b9f40 INFO: task kworker/1:861:5548 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:5551 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:84d63000 r4:84d63000 [<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d63000 r4:8291a680 [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d63000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb025000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562538c r4:85625000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562538c r4:856bd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d63000 r8:856bd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856bd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd080 r8:80287e08 r7:ebbe9e60 r6:85600700 r5:84d63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbedfb0 to 0xebbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856bc0c0 INFO: task kworker/1:862:5551 is blocked on a mutex likely owned by task kworker/0:123:3540. task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800 r4:00000000 [<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffe1d28 to 0xdffe1d70) 1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001 1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78 1d60: 80230ad0 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08 r4:dffe1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00 r4:00000000 [<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef9f8c r4:85ef9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e0be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d87ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00070013 r5:60070093 r4:82257e00 [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<80220048>] (dump_stack) from [<81a3d08c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3cf2c>] (nmi_cpu_backtrace) from [<81a3d1d8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3d0a8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:0000ea92 r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85d86f0c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:80386900 r7:83348780 r6:83348780 r5:83251800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8334b500 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5c2ac>] lr : [<80a629ec>] psr: 60070013 sp : ebe39eb0 ip : ebe39ec0 fp : ebe39ebc r10: 8295b3bc r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000e1f8 r2 : 00000000 r1 : 60070013 r0 : 842e5440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 847b3d40 DAC: 00000000 Call trace: [<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:84696000 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:843eb400 r6:843eb400 r5:84696000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83944240